exploit-
intel
Search
Blog
Stats
Labs
Tools
Tools
EIP CLI Search Tool
EIP MCP Server
EIP REST API
API Rate Limits
About
About
About Exploit Intel
About Exploit Forge
Privacy Policy
RSS Feeds
Blog Posts
Recent CVEs
CVEs with Exploits
CISA KEV
Theme
Color Theme
Cyan
Amber
Milw0rm
Light Warm
Paper
Navy
Search
Blog
Statistics
Labs
Tools
EIP CLI Search Tool
EIP MCP Server
EIP REST API
API Rate Limits
About
About Exploit Forge
Privacy
Exploit Database
Researchers
CWE Categories
Vendors
Ecosystems
RSS Feeds
Blog Posts
Recent CVEs
CVEs with Exploits
CISA KEV
Follow:
Theme:
Home
/
Researchers
/
Fabian Braeunlein
Fabian Braeunlein
2
exploits
Active since May 2015
CVE-2014-9727
METASPLOIT
ruby
WORKING POC
AVM Fritz!Box - RCE
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.
View Code
EIP-2026-101286
EXPLOITDB
ruby
WORKING POC
Fritz!Box Webcm - Command Injection (Metasploit)
View Code