Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-45701

EPSS 38.84% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-45701

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Arris TG2482A firmware through 9.1.103GEM9 allow Remote Code Execution (RCE) via the ping utility feature.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ARRIS TG2482A 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ARRIS TG2482A是美国ARRIS公司的一款高性能、高质量的家庭网关。用于提供高速宽带、VoIP 电话和全家庭 Wi-Fi。 ARRIS TG2482A 9.1.103GEM9版本存在安全漏洞。攻击者利用该漏洞通过 ping 实用程序功能进行远程代码执行 (RCE)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-45701

#POC DescriptionSource LinkShenlong Link
1Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated) POC Exploit (CVE-2022-45701)https://github.com/yerodin/CVE-2022-45701POC Details
2it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.https://github.com/geniuszlyy/CVE-2022-45701POC Details
3it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.https://github.com/geniuszly/CVE-2022-45701POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-45701

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-02-17 · 35 CVEs total

CVE-2023-24078Real Time Logic FuguHub 代码注入漏洞
CVE-2022-32972Infoblox BloxOne Endpoint 代码问题漏洞
CVE-2022-40021QVidium Technologies Amino A140 命令注入漏洞
CVE-2022-40032Simple Task Managing System SQL注入漏洞
CVE-2022-40347Intern Record System SQL注入漏洞
CVE-2022-48115Jspreadsheet CE 跨站脚本漏洞
CVE-2023-23007EARCLINK ESPCMS SQL注入漏洞
CVE-2023-23064TOTOLINK A720R 安全漏洞
CVE-2023-23279Canteen Management System SQL注入漏洞
CVE-2021-35261BearAdmin 代码问题漏洞
CVE-2023-24219Luckyframe SQL注入漏洞
CVE-2023-24220LuckyFrame SQL注入漏洞
CVE-2023-24221LuckyFrame SQL注入漏洞
CVE-2023-24329Python 输入验证错误漏洞
CVE-2023-24369UJCMS 跨站脚本漏洞
CVE-2023-24769changedetection.io 跨站脚本漏洞
CVE-2023-24785PeaZip 安全漏洞
CVE-2021-33391HTACG HTML Tidy 资源管理错误漏洞
CVE-2020-19824mpv 竞争条件问题漏洞
CVE-2020-29168Online Doctor Appointment Booking System SQL注入漏洞

Showing top 20 of 35 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-45701

No comments yet


Leave a comment