Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Aviatrix | Controller | 0 ~ 7.1.4191 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-50603-nuclei-poc | https://github.com/newlinesec/CVE-2024-50603 | POC Details |
| 2 | CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection | https://github.com/th3gokul/CVE-2024-50603 | POC Details |
| 3 | An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-50603.yaml | POC Details |
| 4 | Aviatrix Controller Unauthenticated OS Command Injection | https://github.com/h0w1tzxr/CVE-2024-50603 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet