PoC for CVE-2023-23333 (solarView-Compact)
This script checks if an IP address is vulnerable to CVE-2023-23333. It utilizes the curl
command to execute a specific command on the target device and capture the output. If the IP address is vulnerable, it displays the output and saves the full output to a file.
Prerequisites
- Python 3.x
curl
command-line tool
Usage
-
Clone the repository:
git clone https://github.com/WhiteOwl-Pub/PoC-SolarView-Compact-CVE-2023-23333.git Change into the project directory: shell cd PoC-SolarView-Compact-CVE-2023-23333
Run the script:
shell
python script.py
When prompted, enter the IP address and port of the device in the format: 10.10.10.10:82
The script will execute the command and display the vulnerability status. If the IP address is vulnerable, it will show the output.
The full output will be saved to a file named full-output.txt in the same directory.
This script is for educational and informational purposes only. Use it responsibly and at your own risk.