The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.
- http://packetstormsecurity.com/files/163303/ES-File-Explorer-4.1.9.7.4-Arbitrary-File-Read.html
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
- https://github.com/0x7n6/OSCP
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xT11/CVE-POC
- https://github.com/0xZipp0/OSCP
- https://github.com/0xsyr0/OSCP
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Chethine/EsFileExplorer-CVE-2019-6447
- https://github.com/Cmadhushanka/CVE-2019-6447-Exploitation
- https://github.com/EnriqueSanchezdelVillar/NotesHck
- https://github.com/Faizan-Khanx/OSCP
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/H3xL00m/CVE-2019-6447
- https://github.com/KasunPriyashan/CVE-2019_6447-ES-File-Explorer-Exploitation
- https://github.com/KaviDk/CVE-2019-6447-in-Mobile-Application
- https://github.com/Kayky-cmd/CVE-2019-6447--.
- https://github.com/Ly0nt4r/OSCP
- https://github.com/N3H4L/CVE-2019-6447
- https://github.com/N3rdyN3xus/CVE-2019-6447
- https://github.com/Nehal-Zaman/CVE-2019-6447
- https://github.com/NyxByt3/CVE-2019-6447
- https://github.com/Osuni-99/CVE-2019-6447
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
- https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447
- https://github.com/SantoriuHen/NotesHck
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SirElmard/ethical_hacking
- https://github.com/Sp3c73rSh4d0w/CVE-2019-6447
- https://github.com/VinuKalana/CVE-2019-6447-Android-Vulnerability-in-ES-File-Explorer
- https://github.com/VishuGahlyan/OSCP
- https://github.com/amjadkhan345/esfile
- https://github.com/angristan/awesome-stars
- https://github.com/c0d3cr4f73r/CVE-2019-6447
- https://github.com/codeonlinux/esexplorervuln
- https://github.com/crypticdante/CVE-2019-6447
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
- https://github.com/exfilt/CheatSheet
- https://github.com/fazilbaig1/oscp
- https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit
- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
- https://github.com/h3x0v3rl0rd/CVE-2019-6447
- https://github.com/h3xcr4ck3r/CVE-2019-6447
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/jitmondal1/OSCP
- https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447
- https://github.com/k4u5h41/CVE-2019-6447
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/mooyoul/awesome-stars
- https://github.com/n0-traces/cve_monitor
- https://github.com/n3ov4n1sh/CVE-2019-6447
- https://github.com/n3rdh4x0r/CVE-2019-6447
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oscpname/OSCP_cheat
- https://github.com/parth45/cheatsheet
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/revanmalang/OSCP
- https://github.com/svg153/awesome-stars
- https://github.com/txuswashere/OSCP
- https://github.com/vino-theva/CVE-2019-6447
- https://github.com/volysandro/cve_2019-6447
- https://github.com/x00tex/hackTheBox
- https://github.com/xhref/OSCP
- https://github.com/xorya1/Exploits-for-Mobile-Evidence-Acquisition
- https://github.com/zhanpengliu-tencent/medium-cve