Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-46080

EPSS 15.19% · P95
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-46080

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nexxt Nebula 1200-AC 15.03.06.60 allows authentication bypass and command execution by using the HTTPD service to enable TELNET.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nexxt Nebula 1200-AC 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nexxt Nebula 1200-AC是美国Nexxt公司的一款无线路由器。 Nexxt Nebula 1200-AC 15.03.06.60 版本存在安全漏洞,该漏洞源于使用 HTTPD 服务启用 TELNET 来绕过身份验证和命令执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-46080

#POC DescriptionSource LinkShenlong Link
1Nexxt Router 15.03.06.60 Authentication Bypass and Remote Command Executionhttps://github.com/yerodin/CVE-2022-46080POC Details
2it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.https://github.com/geniuszlyy/CVE-2022-46080POC Details
3it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.https://github.com/geniuszly/CVE-2022-46080POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-46080

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-07-06 · 42 CVEs total

CVE-2023-301957.5 HIGHPrestaShop 安全漏洞
CVE-2023-261377.2 HIGHDrogon 环境问题漏洞
CVE-2023-261385.4 MEDIUMDrogon 注入漏洞
CVE-2023-36968Food Ordering System SQL注入漏洞
CVE-2023-37192Bitcoin Core 安全漏洞
CVE-2023-36189LangChain SQL注入漏洞
CVE-2023-36188LangChain 注入漏洞
CVE-2021-46896PX4 Drone Autopilot 安全漏洞
CVE-2020-22336pdfcrack 缓冲区错误漏洞
CVE-2020-21862DuxCMS 路径遍历漏洞
CVE-2020-21861DuxCMS 代码问题漏洞
CVE-2023-37454Linux kernel 资源管理错误漏洞
CVE-2023-37453Linux kernel 缓冲区错误漏洞
CVE-2023-34193Synacor Zimbra Collaboration Server 代码问题漏洞
CVE-2023-34192Synacor Zimbra Collaboration Server 跨站脚本漏洞
CVE-2023-30321ChatEngine 跨站脚本漏洞
CVE-2023-30320wliang6 ChatEngine 跨站脚本漏洞
CVE-2023-30319ChatEngine 跨站脚本漏洞
CVE-2023-29382Synacor Zimbra Collaboration Server 安全漏洞
CVE-2023-29381Zimbra Collaboration Server 安全漏洞

Showing top 20 of 42 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-46080

No comments yet


Leave a comment