CVE-2022-4616
Description
The webserver in Delta DX-3021 versions prior to 1.24 is vulnerable to command injection through the network diagnosis page. This vulnerability could allow a remote unauthenticated user to add files, delete files, and change file permissions.
- CVSS Version 3.1
CVE ID: CVE-2022-4616
Base Score: 9.1
Base Severity: CRITICAL
Vector String:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Impact Score: 5.2
Exploitability Score: 3.9
CVE ID: CVE-2022-4616
Base Score: 7.2
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.2
Proof Of Concept
ahanel13
This Python script aids in exploiting CVE-2022-46169 by automating payload delivery and response handling. It starts an HTTP server, listens for requests, and enables command input for real-time interaction with a vulnerable target.
Refrence: GitHub
Content on GitHub
0xf4n9x | watchers:48
CVE-2022-46169
CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.
Refrence: GitHub
sAsPeCt488 | watchers:28
CVE-2022-46169
PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22
Refrence: GitHub
FredBrave | watchers:38
CVE-2022-46169-CACTI-1.2.22
This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.
Refrence: GitHub
c3rrberu5 | watchers:10
CVE-2022-46169
Exploit to CVE-2022-46169 vulnerability
Refrence: GitHub
ariyaadinatha | watchers:16
cacti-cve-2022-46169-exploit
This is poc of CVE-2022-46169 authentication bypass and remote code execution
Refrence: GitHub
stephenbradshaw | watchers:11
CVE-2022-46164-poc
Basic POC exploit for CVE-2022-46164
Refrence: GitHub
Inplex-sys | watchers:3
CVE-2022-46169
Cacti Unauthenticated Command Injection
Refrence: GitHub
taythebot | watchers:1
CVE-2022-46169
CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)
Refrence: GitHub
m3ssap0 | watchers:1
cacti-rce-cve-2022-46169-vulnerable-application
WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!
Refrence: GitHub
N1arut | watchers:3
CVE-2022-46169_POC
RCE POC for CVE-2022-46169
Refrence: GitHub
Habib0x0 | watchers:2
CVE-2022-46169
Cacti: Unauthenticated Remote Code Execution Exploit in Ruby
Refrence: GitHub
DickDock | watchers:2
CVE-2022-46166
CVE-2022-46166 靶场环境
Refrence: GitHub
ruycr4ft | watchers:2
CVE-2022-46169
Exploit for cacti version 1.2.22
Refrence: GitHub
JacobEbben | watchers:3
CVE-2022-46169_unauth_remote_code_execution
Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0
Refrence: GitHub
HPT-Intern-Task-Submission | watchers:0
CVE-2022-46169
Refrence: GitHub
devilgothies | watchers:0
CVE-2022-46169
PoC for CVE-2022-46169 that affects Cacti 1.2.22 version
Refrence: GitHub
imjdl | watchers:0
CVE-2022-46169
CVE-2022-46169
Refrence: GitHub
Safarchand | watchers:1
CVE-2022-46169
Improved PoC for Unauthenticated RCE on Cacti <= 1.2.22 - CVE-2022-46169
Refrence: GitHub
0xN7y | watchers:1
CVE-2022-46169
Exploit for CVE-2022-46169
Refrence: GitHub
BKreisel | watchers:0
CVE-2022-46169
🐍 Python Exploit for CVE-2022-46169
Refrence: GitHub
miko550 | watchers:0
CVE-2022-46169
Refrence: GitHub
MarkStrendin | watchers:0
CVE-2022-46169
Proof of concept / CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22
Refrence: GitHub
a1665454764 | watchers:0
CVE-2022-46169
CVE-2022-46169
Refrence: GitHub
mind2hex | watchers:0
CVE-2022-46169
Refrence: GitHub
doosec101 | watchers:1
CVE-2022-46169
Repo for CVE-2022-46169
Refrence: GitHub
antisecc | watchers:0
CVE-2022-46169
Refrence: GitHub
dawnl3ss | watchers:0
CVE-2022-46169
Unauthenticated Command Injection in Cacti <= 1.2.22
Refrence: GitHub
yassinebk | watchers:0
CVE-2022-46169
CVE-2022-46169
Refrence: GitHub
icebreack | watchers:1
CVE-2022-46169
Fixed exploit for CVE-2022-46169 (originally from https://www.exploit-db.com/exploits/51166)
Refrence: GitHub
0xZon | watchers:0
CVE-2022-46169-Exploit
Refrence: GitHub