尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Zyxel | USG FLEX 100(W) firmware | 5.00 through 5.21 Patch 1 | - | |
| Zyxel | USG FLEX 200 firmware | 5.00 through 5.21 Patch 1 | - | |
| Zyxel | USG FLEX 500 firmware | 5.00 through 5.21 Patch 1 | - | |
| Zyxel | USG FLEX 700 firmware | 5.00 through 5.21 Patch 1 | - | |
| Zyxel | ATP series firmware | 5.10 through 5.21 Patch 1 | - | |
| Zyxel | VPN series firmware | 4.60 through 5.21 Patch 1 | - | |
| Zyxel | USG FLEX 50(W) firmware | 5.10 through 5.21 Patch 1 | - | |
| Zyxel | USG 20(W)-VPN firmware | 5.10 through 5.21 Patch 1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Proof of concept exploit for CVE-2022-30525 (Zxyel firewall command injection) | https://github.com/jbaines-r7/victorian_machinery | POC详情 |
| 2 | Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525) | https://github.com/Henry4E36/CVE-2022-30525 | POC详情 |
| 3 | Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)批量检测脚本 | https://github.com/shuai06/CVE-2022-30525 | POC详情 |
| 4 | Zyxel 防火墙未经身份验证的远程命令注入 | https://github.com/savior-only/CVE-2022-30525 | POC详情 |
| 5 | Zyxel Firewall Remote Command Injection Vulnerability (CVE-2022-30525) Batch Detection Script | https://github.com/M4fiaB0y/CVE-2022-30525 | POC详情 |
| 6 | CVE-2022-30525(Zxyel 防火墙命令注入)的概念证明漏洞利用 | https://github.com/k0sf/CVE-2022-30525 | POC详情 |
| 7 | CVE-2022-30525 POC exploit | https://github.com/superzerosec/CVE-2022-30525 | POC详情 |
| 8 | Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection | https://github.com/Chocapikk/CVE-2022-30525-Reverse-Shell | POC详情 |
| 9 | CVE-2022-30525 Zyxel防火墙命令注入漏洞 POC&EXP | https://github.com/160Team/CVE-2022-30525 | POC详情 |
| 10 | Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection | https://github.com/zhefox/CVE-2022-30525-Reverse-Shell | POC详情 |
| 11 | Initial POC for the CVE-2022-30525 | https://github.com/iveresk/cve-2022-30525 | POC详情 |
| 12 | CVE-2022-30525 Zyxel 防火墙命令注入漏洞 POC&EXPC | https://github.com/west9b/CVE-2022-30525 | POC详情 |
| 13 | A OS Command Injection Vulnerability in the CGI Program of Zyxel | https://github.com/furkanzengin/CVE-2022-30525 | POC详情 |
| 14 | CVE-2022-30525 POC | https://github.com/ProngedFork/CVE-2022-30525 | POC详情 |
| 15 | None | https://github.com/cbk914/CVE-2022-30525_check | POC详情 |
| 16 | Exploit for CVE-2022-30525 | https://github.com/arajsingh-infosec/CVE-2022-30525_Exploit | POC详情 |
| 17 | Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection | https://github.com/5l1v3r1/CVE-2022-30525-Reverse-Shell | POC详情 |
| 18 | An OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, are susceptible to a command injection vulnerability which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-30525.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论