Skip to main content

CVE-2022-4616

Description

The webserver in Delta DX-3021 versions prior to 1.24 is vulnerable to command injection through the network diagnosis page. This vulnerability could allow a remote unauthenticated user to add files, delete files, and change file permissions.

nvd
CVE ID: CVE-2022-4616
Base Score: 9.1
Base Severity: CRITICAL
Vector String:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Impact Score: 5.2
Exploitability Score: 3.9
hq.dhs
CVE ID: CVE-2022-4616
Base Score: 7.2
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.2

Proof Of Concept

ahanel13

This Python script aids in exploiting CVE-2022-46169 by automating payload delivery and response handling. It starts an HTTP server, listens for requests, and enables command input for real-time interaction with a vulnerable target.

Refrence: GitHub

Content on GitHub

0xf4n9x | watchers:48

CVE-2022-46169
CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.

Refrence: GitHub

sAsPeCt488 | watchers:28

CVE-2022-46169
PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22

Refrence: GitHub

FredBrave | watchers:38

CVE-2022-46169-CACTI-1.2.22
This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.

Refrence: GitHub

c3rrberu5 | watchers:10

CVE-2022-46169
Exploit to CVE-2022-46169 vulnerability

Refrence: GitHub

ariyaadinatha | watchers:16

cacti-cve-2022-46169-exploit
This is poc of CVE-2022-46169 authentication bypass and remote code execution

Refrence: GitHub

stephenbradshaw | watchers:11

CVE-2022-46164-poc
Basic POC exploit for CVE-2022-46164

Refrence: GitHub

Inplex-sys | watchers:3

CVE-2022-46169
Cacti Unauthenticated Command Injection

Refrence: GitHub

taythebot | watchers:1

CVE-2022-46169
CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth)

Refrence: GitHub

m3ssap0 | watchers:1

cacti-rce-cve-2022-46169-vulnerable-application
WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk!

Refrence: GitHub

N1arut | watchers:3

CVE-2022-46169_POC
RCE POC for CVE-2022-46169

Refrence: GitHub

Habib0x0 | watchers:2

CVE-2022-46169
Cacti: Unauthenticated Remote Code Execution Exploit in Ruby

Refrence: GitHub

DickDock | watchers:2

CVE-2022-46166
CVE-2022-46166 靶场环境

Refrence: GitHub

ruycr4ft | watchers:2

CVE-2022-46169
Exploit for cacti version 1.2.22

Refrence: GitHub

JacobEbben | watchers:3

CVE-2022-46169_unauth_remote_code_execution
Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0

Refrence: GitHub

HPT-Intern-Task-Submission | watchers:0

CVE-2022-46169

Refrence: GitHub

devilgothies | watchers:0

CVE-2022-46169
PoC for CVE-2022-46169 that affects Cacti 1.2.22 version

Refrence: GitHub

imjdl | watchers:0

CVE-2022-46169
CVE-2022-46169

Refrence: GitHub

Safarchand | watchers:1

CVE-2022-46169
Improved PoC for Unauthenticated RCE on Cacti <= 1.2.22 - CVE-2022-46169

Refrence: GitHub

0xN7y | watchers:1

CVE-2022-46169
Exploit for CVE-2022-46169

Refrence: GitHub

BKreisel | watchers:0

CVE-2022-46169
🐍 Python Exploit for CVE-2022-46169

Refrence: GitHub

miko550 | watchers:0

CVE-2022-46169

Refrence: GitHub

MarkStrendin | watchers:0

CVE-2022-46169
Proof of concept / CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22

Refrence: GitHub

a1665454764 | watchers:0

CVE-2022-46169
CVE-2022-46169

Refrence: GitHub

mind2hex | watchers:0

CVE-2022-46169

Refrence: GitHub

doosec101 | watchers:1

CVE-2022-46169
Repo for CVE-2022-46169

Refrence: GitHub

antisecc | watchers:0

CVE-2022-46169

Refrence: GitHub

dawnl3ss | watchers:0

CVE-2022-46169
Unauthenticated Command Injection in Cacti <= 1.2.22

Refrence: GitHub

yassinebk | watchers:0

CVE-2022-46169
CVE-2022-46169

Refrence: GitHub

icebreack | watchers:1

CVE-2022-46169
Fixed exploit for CVE-2022-46169 (originally from https://www.exploit-db.com/exploits/51166)

Refrence: GitHub

0xZon | watchers:0

CVE-2022-46169-Exploit

Refrence: GitHub

Refrence: NVDMITRE