mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 22:53:11 +00:00
59 lines
2.5 KiB
Markdown
59 lines
2.5 KiB
Markdown
### [CVE-2021-46422](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46422)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html
|
|
- http://packetstormsecurity.com/files/167387/Telesquare-SDT-CW3B1-1.1.0-Command-Injection.html
|
|
- https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing
|
|
|
|
#### Github
|
|
- https://github.com/12442RF/POC
|
|
- https://github.com/20142995/nuclei-templates
|
|
- https://github.com/20142995/pocsuite3
|
|
- https://github.com/5l1v3r1/CVE-2021-46422
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/Awei507/CVE-RCE
|
|
- https://github.com/CJ-0107/cve-2021-46422
|
|
- https://github.com/CJ-0107/cve-2022-26134
|
|
- https://github.com/Chocapikk/CVE-2021-46422
|
|
- https://github.com/DMW11525708/wiki
|
|
- https://github.com/Lern0n/Lernon-POC
|
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
|
- https://github.com/SYRTI/POC_to_review
|
|
- https://github.com/StarCrossPortal/scalpel
|
|
- https://github.com/WhooAmii/POC_to_review
|
|
- https://github.com/ZAxyr/CVE-2021-46422
|
|
- https://github.com/adysec/POC
|
|
- https://github.com/anonymous364872/Rapier_Tool
|
|
- https://github.com/apif-review/APIF_tool_2024
|
|
- https://github.com/apit-review-account/apit-tool
|
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
|
- https://github.com/eeeeeeeeee-code/POC
|
|
- https://github.com/feierjiaxian/SDT-CW3B1-1.1.0---OS-Command-Injection
|
|
- https://github.com/kailing0220/CVE-2021-46422
|
|
- https://github.com/kelemaoya/CVE-2021-46422
|
|
- https://github.com/laoa1573/wy876
|
|
- https://github.com/latings/CVE-2021-46422
|
|
- https://github.com/nobodyatall648/CVE-2021-46422
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/oLy0/Vulnerability
|
|
- https://github.com/polerstar/CVE-2021-46422-poc
|
|
- https://github.com/trhacknon/Pocingit
|
|
- https://github.com/tucommenceapousser/CVE-2021-46422
|
|
- https://github.com/twoning/CVE-2021-46422_PoC
|
|
- https://github.com/xanszZZ/SDT_CW3B1_rce
|
|
- https://github.com/yigexioabai/CVE-2021-46422_RCE
|
|
- https://github.com/youcans896768/APIV_Tool
|
|
- https://github.com/yyqxi/CVE-2021-46422
|
|
- https://github.com/zecool/cve
|
|
|