Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SDT-CW3B1 1.1.0 - OS Command Injection | https://github.com/nobodyatall648/CVE-2021-46422 | POC Details |
| 2 | Telesquare SDT-CW3B1 1.1.0 - OS Command Injection | https://github.com/Chocapikk/CVE-2021-46422 | POC Details |
| 3 | CVE-2021-46422_PoC | https://github.com/twoning/CVE-2021-46422_PoC | POC Details |
| 4 | Telesquare SDT-CW3B1 1.1.0 - OS Command Injection | https://github.com/5l1v3r1/CVE-2021-46422 | POC Details |
| 5 | CVE-2021-46422漏洞 | https://github.com/Awei507/CVE-RCE | POC Details |
| 6 | None | https://github.com/yigexioabai/CVE-2021-46422_RCE | POC Details |
| 7 | SDT-CW3B1韩国的无线路由器 os cmd 注入PoC | https://github.com/ZAxyr/CVE-2021-46422 | POC Details |
| 8 | 批量检测CVE-2021-46422 RCE漏洞 | https://github.com/xanszZZ/SDT_CW3B1_rce | POC Details |
| 9 | CVE-2021-46422 | https://github.com/latings/CVE-2021-46422 | POC Details |
| 10 | cve-2021-46422 | https://github.com/CJ-0107/cve-2021-46422 | POC Details |
| 11 | 韩国的无线路由器 os cmd 注入 | https://github.com/kelemaoya/CVE-2021-46422 | POC Details |
| 12 | CVE-2021-46422poc | https://github.com/yyqxi/CVE-2021-46422 | POC Details |
| 13 | 漏洞检测 | https://github.com/polerstar/CVE-2021-46422-poc | POC Details |
| 14 | Telesquare SDT-CW3B1 1.1.0 版本存在操作系统命令注入漏洞。远程攻击者可利用该漏洞在无需任何身份验证的情况下执行操作系统命令。 | https://github.com/kailing0220/CVE-2021-46422 | POC Details |
| 15 | None | https://github.com/tucommenceapousser/CVE-2021-46422 | POC Details |
| 16 | Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-46422.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-46420 | Franklin Fueling Systems 路径遍历漏洞 | |
| CVE-2022-27239 | cifs-utils缓冲区错误漏洞 | |
| CVE-2022-28085 | HTMLDOC 缓冲区错误漏洞 | |
| CVE-2022-27331 | Zammad 安全漏洞 | |
| CVE-2022-27332 | Zammad 访问控制错误漏洞 | |
| CVE-2022-29701 | Zammad 安全漏洞 | |
| CVE-2022-29700 | Zammad 安全漏洞 | |
| CVE-2022-29810 | Hashicorp go-getter 日志信息泄露漏洞 | |
| CVE-2021-46442 | D-Link DIR-825 G1 安全漏洞 | |
| CVE-2021-46441 | D-Link DIR-825 G1 操作系统命令注入漏洞 | |
| CVE-2022-29859 | ambiot amb1_sdk 安全漏洞 | |
| CVE-2021-46421 | Franklin Fueling Systems 路径遍历漏洞 | |
| CVE-2021-46423 | Telesquare TLR-2005Ksh 安全漏洞 | |
| CVE-2021-46424 | Telesquare TLR-2005Ksh 安全漏洞 | |
| CVE-2022-28464 | Apifox跨站脚本漏洞 | |
| CVE-2022-27905 | Controlup Real-Time Agent 代码问题漏洞 | |
| CVE-2022-27336 | Seacms 注入漏洞 | |
| CVE-2022-24372 | Linksys MR9600 后置链接漏洞 | |
| CVE-2021-3523 | Red Hat 3scale 安全漏洞 |
No comments yet