wei Profile
wei

@XiaoWei___

Followers
2K
Following
88
Statuses
21

virtualization and webbrowser security researcher

People's Republic of China
Joined July 2018
Don't wanna be here? Send us removal request.
@XiaoWei___
wei
6 months
@foxtrot_0x4fult Considering its harm, I will not disclose more details in the short term.
2
2
20
@XiaoWei___
wei
6 months
RT @mj0011sec: 0Click Windows Tcpip RCE found by Kunlun Lab. We offer intel services for proactive defense to critical vulnerabilities. Con…
0
3
0
@XiaoWei___
wei
6 months
@IIlIIlIIIII @daveaitel The bug triggers before fw handling the packet.
2
3
32
@XiaoWei___
wei
6 months
@vv474172261 congratulations!
0
0
1
@XiaoWei___
wei
6 months
Glad to progress with my friends.I got #2 this time.Thanks msrc and my friends.
@msftsecresponse
Security Response
6 months
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s 100 Most Valuable Researchers (MVRs), based on the total number of points earned for each valid report. Please join us in celebrating this year’s MVRs, including our top 10: 1. 🥇 Yuki Chen @guhe120 2. 🥈Wei @XiaoWei___ 3. 🥉VictorV @vv474172261 4. Suresh Chelladurai 5. Dhiral Patel @dhiralpatel94 6. Erik Donker @kire_devs_hacks 7. Nutesh Surana @_niteshsurana working with Trend Micro Zero Day Initiative @thezdi 8. Anonymous 9. Tzah Pahima @TzahPahima 10. wkai See the full list of this year’s 100 MVRs, in addition to our Azure, Office, Windows, and Dynamics 365 leaderboards: #bugbounty #infosec
Tweet media one
3
0
22
@XiaoWei___
wei
7 months
@wxwlwkl 我用的realtek,能成功触发漏洞就行,我不需要crash
0
0
0
@XiaoWei___
wei
8 months
@f4rmpoet @vanhoefm well done.But this bug could be triggered after association and before handshake have finished.On the moment data packet is not encrypted.This means that there is no need for attacker to join the network.attacker just do a deauth attack first and then trigger the bug.
1
1
6
@XiaoWei___
wei
8 months
@encrypted_past @guhe120 It' a bug in nwifi.sys.
1
0
1
@XiaoWei___
wei
9 months
@realBrightiup @Jioun_dai 期待卓总出一个rjb
0
0
1
@XiaoWei___
wei
9 months
@hackyzh haha
0
0
1
@XiaoWei___
wei
1 year
@guhe120 Same to me,omi is out of scope.
1
0
0
@XiaoWei___
wei
4 years
@Synacktiv @soaphornseuo @BrunoPujos @OnlyTheDuck @ekoparty I have this bug for several years. It is a good bug.I have a very stable exploit for it.
0
1
8
@XiaoWei___
wei
5 years
@_nafod haha,I have made a ckeck.If host have a bluetooth and it's turned on,then virtual bluetooth will be a default device.
0
0
3
@XiaoWei___
wei
5 years
@thezdi @abdhariri @fluoroacetate @abdhariri @fluoroacetate It seems that the bug can not be triggered with default configuration in vmware workstation. There are a usb hub devive and a hid device with default config. In my debugging,they don't support bulk endpoints. Did i do anything wrong?
0
0
3
@XiaoWei___
wei
6 years
This bug can not only leak info but also lead to vm escape. I used it in tianfu cup 2018.
0
21
79