Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| webmin | webmin/webmin | unspecified ~ 1.990 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC | https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell | POC Details |
| 2 | Deployement of Webmin version 1.984 which is vulnerable to authenticated remote code execution exploit. | https://github.com/honypot/CVE-2022-0824 | POC Details |
| 3 | Exploit POC for CVE-2022-0824 | https://github.com/pizza-power/golang-webmin-CVE-2022-0824-revshell | POC Details |
| 4 | CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit | https://github.com/gokul-ramesh/WebminRCE-exploit | POC Details |
| 5 | Webmin before 1.990 is susceptible to improper access control in GitHub repository webmin/webmin. This in turn can lead to remote code execution, by which an attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-0824.yaml | POC Details |
| 6 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Webmin%20update.cgi%20%E5%90%8E%E5%8F%B0%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-0824.md | POC Details |
| 7 | Webmin CVE-2022-0824 增强版漏洞利用工具 - 支持命令执行和反向Shell双模式 | https://github.com/NUDTTAN91/Webmin-CVE-2022-0824-Enhanced-Exploit | POC Details |
No public POC found.
Login to generate AI POCNo comments yet