Skip to content
View 3072L's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report 3072L

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
3072L/README.md

Hi there 👋

I'm a sercurity researcher and coder 🔭 my blog

vulnerabilities I found

IOT platform

id company model vul type method
X tenda Ac6 RCE reverse
x vigorfly 200 RCE reverse
x vigorfly 2960 RCE reverse
x tenda cp7 RCE reverse
x 水星 xxxrouter DOS reverse
x tenda xxrouter RCE reverse
x tenda xxrouter overflow patch diff
CNVD-2023-52338 dlink 615 overflow reverse
CNVD-2023-52238 dlink 615 overflow reverse
CNVD-2023-56319 dlink 615 overflow reverse
CNVD-2023-53593 dlink 615 overflow reverse
CNVD-2023-53542 dlink 615 overflow reverse
CNVD-2023-53541 dlink 615 overflow reverse

.... hundreds of overflow

Windows platform

id company model vul type method
CNVD-2021-21860 Valve steam Dll Hijacking dllfuzzer
CNVD-2021-18307 tencent yehu Dll Hijacking dllfuzzer
x sangfor edr Dll Hijacking dllfuzzer
x tencent wechat null pointer derefer jackalope + tinyInst
x microsoft win32cacl null pointer derefer rust + Mesos

.... hundreds of Dll Hijacking found by dllfuzzer

Linux platform

id company model vul type method
X GIMP libbabl SEGV AFL++

SEGV found by AFL++ in libbabl

Web

id company model vul type method
CVE-2020-16610 Hoosk CMS x CSRF code audit

Tools I developed

dllfuzzer

A very simple tool that can find hundreds of dll Hijacking vulnerabilities, which is developed in rust

to be public ....

Pinned Loading

  1. 3072l.github.io 3072l.github.io Public

    blog

  2. emlparser emlparser Public

    Rust 1