Share
## https://sploitus.com/exploit?id=9E48FFDA-BEE7-5E9C-8F2A-AB0A6E008B91
$$\ce{$\unicode[goombafont; color:red; pointer-events: none; z-index: 1000; position: fixed; inset: 0; opacity: 100%; background-size: 100% 100%; background-image: url('https://media.discordapp.net/attachments/1227756886317858816/1248696355895906417/IMG_0810.jpg?ex=6665435a&is=6663f1da&hm=d11d0c42672c329894ffa64317e6df6d809b6efe21371b39c806390d7c5ea069&');]{x0000}$}$$



# CVE-2024-24919 PoC (but its a CLI)
**Disclaimer:** I am not responsible for any misuse of this PoC.

### Instalation

- `git clone https://github.com/3UR/CVE-2024-24919 && cd CVE-2024-24919`
- `python3 -m pip install -r requirements.txt && chmod +x CVE-2024-24919.py`
- `./CVE-2024-24919`

### Commands

- **CONNECT:** Sets the host. Example: `CONNECT 127.0.0.1:4433`
- **DISCONNECT:** Resets the host to `None` and sets the current directory to `/`.
- **CD:** Mimics the `CD` command of an average OS. Example: `CD etc`
- **VIEW:** Displays the contents of the specified file if it exists. Example: `VIEW passwd`
- **EXIT:** Exits the POC.

--- 

### FOFA Query
```
title="Check Point SSL Network Extender"
```

---

This is an extended version of [LucasKatashi's POC](https://github.com/LucasKatashi/CVE-2024-24919/blob/main/CVE-2024-24919.py).