Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Acronis | Acronis Cyber Infrastructure | unspecified ~ 5.0.1-61 | - | |
| Acronis | Acronis Cyber Infrastructure | unspecified ~ 5.1.1-71 | - | |
| Acronis | Acronis Cyber Infrastructure | unspecified ~ 5.2.1-69 | - | |
| Acronis | Acronis Cyber Infrastructure | unspecified ~ 5.3.1-53 | - | |
| Acronis | Acronis Cyber Infrastructure | unspecified ~ 5.4.4-132 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, 5.1.1-71, 5.2.1-69, 5.3.1-53, and 5.4.4-132 contain a remote command execution caused by use of default passwords, letting attackers execute arbitrary commands remotely, exploit requires access to the system with default credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2025/CVE-2023-45249.yaml | POC Details |
| 2 | Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, 5.1.1-71, 5.2.1-69, 5.3.1-53, and 5.4.4-132 contain a remote command execution caused by use of default passwords, letting attackers execute arbitrary commands remotely, exploit requires access to the system with default credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2023/CVE-2023-45249.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet