Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-46704 GenieACS Command Injection POC | https://github.com/MithatGuner/CVE-2021-46704-POC | POC Details |
| 2 | CVE-2021-46704 Nuclei template | https://github.com/Erenlancaster/CVE-2021-46704 | POC Details |
| 3 | In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-46704.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet