From 4cf043695cd7b68629cbfc94e61fb651261840c5 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Fri, 3 Nov 2023 12:42:19 +0800 Subject: [PATCH] =?UTF-8?q?Update=20Cisco=20IOS=20XE=20CVE-2023-20198?= =?UTF-8?q?=E6=9D=83=E9=99=90=E6=8F=90=E5=8D=87=E6=BC=8F=E6=B4=9E.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- Cisco IOS XE CVE-2023-20198权限提升漏洞.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/Cisco IOS XE CVE-2023-20198权限提升漏洞.md b/Cisco IOS XE CVE-2023-20198权限提升漏洞.md index 83640d1..a02b5a6 100644 --- a/Cisco IOS XE CVE-2023-20198权限提升漏洞.md +++ b/Cisco IOS XE CVE-2023-20198权限提升漏洞.md @@ -4,6 +4,8 @@ ## poc 请参阅下面的示例请求,该请求绕过易受攻击的 IOS-XE 实例的身份验证。此 POC 创建一个名为baduser权限级别 15 的用户。让我们深入了解详细信息。 + + ![](https://p7i3u3x3.rocketcdn.me/wp-content/uploads/2023/10/Screenshot-2023-10-30-at-2.50.55-PM.png.webp)