Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-31814 Exploitation Toolkit. | https://github.com/EvergreenCartoons/SenselessViolence | POC Details |
| 2 | None | https://github.com/Madliife0/CVE-2022-31814 | POC Details |
| 3 | None | https://github.com/TheUnknownSoul/CVE-2022-31814 | POC Details |
| 4 | CVE-2022-31814 | https://github.com/drcayber/RCE | POC Details |
| 5 | pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814) | https://github.com/Chocapikk/CVE-2022-31814 | POC Details |
| 6 | pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814) | https://github.com/dkstar11q/CVE-2022-31814 | POC Details |
| 7 | Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814) | https://github.com/Laburity/CVE-2022-31814 | POC Details |
| 8 | This script is a proof-of-concept exploit for pfBlockerNG <= 2.1.4_26 that allows for remote code execution. It takes a single target URL or a list of URLs, tries to upload a shell using multiple payloads, executes a command, and then deletes the shell. | https://github.com/ArunHAtter/CVE-2022-31814 | POC Details |
| 9 | Proof of concept for CVE-2022-31814 | https://github.com/Inplex-sys/CVE-2022-31814 | POC Details |
| 10 | pfSense pfBlockerNG through 2.1.4_26 is susceptible to OS command injection via root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-31814.yaml | POC Details |
| 11 | Proof of concept for CVE-2022-31814 | https://github.com/SystemVll/CVE-2022-31814 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet