Files
CVEs-PoC/2021/CVE-2021-46422.md
2025-09-29 21:09:30 +02:00

59 lines
2.5 KiB
Markdown

### [CVE-2021-46422](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46422)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
### POC
#### Reference
- http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html
- http://packetstormsecurity.com/files/167387/Telesquare-SDT-CW3B1-1.1.0-Command-Injection.html
- https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing
#### Github
- https://github.com/12442RF/POC
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/pocsuite3
- https://github.com/5l1v3r1/CVE-2021-46422
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Awei507/CVE-RCE
- https://github.com/CJ-0107/cve-2021-46422
- https://github.com/CJ-0107/cve-2022-26134
- https://github.com/Chocapikk/CVE-2021-46422
- https://github.com/DMW11525708/wiki
- https://github.com/Lern0n/Lernon-POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/StarCrossPortal/scalpel
- https://github.com/WhooAmii/POC_to_review
- https://github.com/ZAxyr/CVE-2021-46422
- https://github.com/adysec/POC
- https://github.com/anonymous364872/Rapier_Tool
- https://github.com/apif-review/APIF_tool_2024
- https://github.com/apit-review-account/apit-tool
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/feierjiaxian/SDT-CW3B1-1.1.0---OS-Command-Injection
- https://github.com/kailing0220/CVE-2021-46422
- https://github.com/kelemaoya/CVE-2021-46422
- https://github.com/laoa1573/wy876
- https://github.com/latings/CVE-2021-46422
- https://github.com/nobodyatall648/CVE-2021-46422
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/polerstar/CVE-2021-46422-poc
- https://github.com/trhacknon/Pocingit
- https://github.com/tucommenceapousser/CVE-2021-46422
- https://github.com/twoning/CVE-2021-46422_PoC
- https://github.com/xanszZZ/SDT_CW3B1_rce
- https://github.com/yigexioabai/CVE-2021-46422_RCE
- https://github.com/youcans896768/APIV_Tool
- https://github.com/yyqxi/CVE-2021-46422
- https://github.com/zecool/cve