Skip to content

ByteWraith1/CVE-2026-0073

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

CVE-2026-0073

Overview

CVE-2026-0073 is a vulnerability found in Android's Wireless ADB (Android Debug Bridge) system, specifically linked to the mutual authentication process of wireless connections.

Requirements

  • Python 3.8+
  • Libraries: requests, argparse (install via pip install -r requirements.txt)

Usage

  • Install dependencies: pip install -r requirements.txt
  • Run the exploit: python exploit.py --target <target_url> --file "/path/to/Web.config"

Details

  • CVE ID: CVE-2026-0073
  • Discovered: 2026-05-4
  • Published: 2026-05-4
  • Exploit Availability: Not public, only private.

Options:

  • --target: URL of the vulnerable CentreStack/TrioFox instance.
  • --file: Relative path to the file to include (e.g., "../../../../Windows/system.ini" for testing).
  • --proxy: Optional HTTP proxy for anonymization.

How It Works

This flaw arises from a logic error in the implementation, which can potentially allow an unauthorized party to exploit this weakness. If successfully exploited, this vulnerability can lead to remote code execution with the privileges of the shell user, meaning an attacker could gain significant access to the system without requiring any interaction from the user. The implications of this vulnerability are particularly concerning given that Android devices are widely used across various sectors, and this vulnerability could enable sophisticated attacks without the need for direct user engagement.

Ethical Use Warning

  • This script is a proof-of-concept for CVE-2026-0073 for educational and authorized security testing purposes.
  • Do not use this script on systems without explicit permission from the system owner.
  • Misuse may violate laws, including the Computer Fraud and Abuse Act (CFAA) in the United States or similar laws elsewhere.
  • Always obtain written consent before testing any system.

PoC Exploit - href

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors