### [CVE-2017-2824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824) ![](https://img.shields.io/static/v1?label=Product&message=Zabbix%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=remote%20code%20execution&color=brighgreen) ### Description An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/LinkleYping/Vulnerability-implementation - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/ZTK-009/RedTeamer - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/fengjixuchui/RedTeamer - https://github.com/listenquiet/cve-2017-2824-reverse-shell - https://github.com/password520/RedTeamer