### [CVE-2021-26752](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26752) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description NeDi 1.9C allows an authenticated user to execute operating system commands in the Nodes Traffic function on the endpoint /Nodes-Traffic.php via the md or ag HTTP GET parameter. This allows an attacker to obtain access to the operating system where NeDi is installed and to all application data. ### POC #### Reference - https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/ #### Github No PoCs found on GitHub currently.