Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-46169 | https://github.com/imjdl/CVE-2022-46169 | POC Details |
| 2 | CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection. | https://github.com/0xf4n9x/CVE-2022-46169 | POC Details |
| 3 | CVE-2022-46169 - Cacti Blind Remote Code Execution (Pre-Auth) | https://github.com/taythebot/CVE-2022-46169 | POC Details |
| 4 | Cacti Unauthenticated Command Injection | https://github.com/Inplex-sys/CVE-2022-46169 | POC Details |
| 5 | PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22 | https://github.com/sAsPeCt488/CVE-2022-46169 | POC Details |
| 6 | Exploit to CVE-2022-46169 vulnerability | https://github.com/botfather0x0/CVE-2022-46169 | POC Details |
| 7 | Cacti: Unauthenticated Remote Code Execution Exploit in Ruby | https://github.com/Habib0x0/CVE-2022-46169 | POC Details |
| 8 | RCE POC for CVE-2022-46169 | https://github.com/N1arut/CVE-2022-46169_POC | POC Details |
| 9 | None | https://github.com/miko550/CVE-2022-46169 | POC Details |
| 10 | This is poc of CVE-2022-46169 authentication bypass and remote code execution | https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit | POC Details |
| 11 | Repo for CVE-2022-46169 | https://github.com/doosec101/CVE-2022-46169 | POC Details |
| 12 | WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2022-46169). Run it at your own risk! | https://github.com/m3ssap0/cacti-rce-cve-2022-46169-vulnerable-application | POC Details |
| 13 | None | https://github.com/devAL3X/CVE-2022-46169_poc | POC Details |
| 14 | Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0 | https://github.com/JacobEbben/CVE-2022-46169_unauth_remote_code_execution | POC Details |
| 15 | Fixed exploit for CVE-2022-46169 (originally from https://www.exploit-db.com/exploits/51166) | https://github.com/icebreack/CVE-2022-46169 | POC Details |
| 16 | PoC for CVE-2022-46169 that affects Cacti 1.2.22 version | https://github.com/devilgothies/CVE-2022-46169 | POC Details |
| 17 | CVE-2022-46169 | https://github.com/yassinebk/CVE-2022-46169 | POC Details |
| 18 | Exploit for cacti version 1.2.22 | https://github.com/ruycr4ft/CVE-2022-46169 | POC Details |
| 19 | This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer. | https://github.com/FredBrave/CVE-2022-46169-CACTI-1.2.22 | POC Details |
| 20 | Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ | https://github.com/sha-16/RCE-Cacti-1.2.22 | POC Details |
| 21 | Improved PoC for Unauthenticated RCE on Cacti <= 1.2.22 - CVE-2022-46169 | https://github.com/Safarchand/CVE-2022-46169 | POC Details |
| 22 | Proof of concept / CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22 | https://github.com/MarkStrendin/CVE-2022-46169 | POC Details |
| 23 | 🐍 Python Exploit for CVE-2022-46169 | https://github.com/BKreisel/CVE-2022-46169 | POC Details |
| 24 | A simple PoC for CVE-2022-46169 a.k.a Cacti Unauthenticated Command Injection, a vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti prior from version 1.2.17 to 1.2.22 | https://github.com/Rickster5555/EH2-PoC | POC Details |
| 25 | None | https://github.com/antisecc/CVE-2022-46169 | POC Details |
| 26 | Unauthenticated Command Injection in Cacti <= 1.2.22 | https://github.com/dawnl3ss/CVE-2022-46169 | POC Details |
| 27 | CVE-2022-46169 | https://github.com/a1665454764/CVE-2022-46169 | POC Details |
| 28 | None | https://github.com/0xZon/CVE-2022-46169-Exploit | POC Details |
| 29 | An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically. | https://github.com/copyleftdev/PricklyPwn | POC Details |
| 30 | Exploit for CVE-2022-46169 | https://github.com/0xN7y/CVE-2022-46169 | POC Details |
| 31 | None | https://github.com/mind2hex/CVE-2022-46169 | POC Details |
| 32 | Exploit to CVE-2022-46169 vulnerability | https://github.com/c3rrberu5/CVE-2022-46169 | POC Details |
| 33 | None | https://github.com/HPT-Intern-Task-Submission/CVE-2022-46169 | POC Details |
| 34 | PoC for Cacti 1.2.22 - CVE-2022-46169 | https://github.com/rockyroadonline/CVE-2022-46169 | POC Details |
| 35 | None | https://github.com/mpvx/CVE-2022-46169 | POC Details |
| 36 | Cacti v1.2.22: Unauthenticated Command Injection Vulnerability (CVE-2022-46169) | https://github.com/lof1sec/CVE-2022-46169 | POC Details |
| 37 | Cacti through 1.2.22 is susceptible to remote command injection. There is insufficient authorization within the remote agent when handling HTTP requests with a custom Forwarded-For HTTP header. An attacker can send a specially crafted HTTP request to the affected instance and execute arbitrary OS commands on the server, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-46169.yaml | POC Details |
| 38 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Cacti%20remote_agent.php%20%E5%89%8D%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2022-46169.md | POC Details |
| 39 | https://github.com/vulhub/vulhub/blob/master/cacti/CVE-2022-46169/README.md | POC Details | |
| 40 | Cacti Unauthenticated Command Injection | https://github.com/SystemVll/CVE-2022-46169 | POC Details |
| 41 | Este es un código del exploit CVE-2022-46169, que recree utilizando Python3! Si por ahí estás haciendo una máquina de HTB, esto te puede ser útil... 🤞✨ | https://github.com/r1nzleer/RCE-Cacti-1.2.22 | POC Details |
| 42 | None | https://github.com/mind2hex/CVE-2022-46169-Cacti-v1.2.22-RCE | POC Details |
| 43 | None | https://github.com/RdBBB3/SHELL-POC-CVE-2022-46169 | POC Details |
| 44 | Find out a modified Cacti public exploit! | https://github.com/alv-david/CVE-2022-46169-Cacti-1.2.22 | POC Details |
| 45 | Proof of concept / CTF script for exploiting CVE-2022-46169 in Cacti, versions >=1.2.22 | https://github.com/nou-man/CVE-2022-46169 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet