CVE-2009-4502

Zabbix Agent <1.6.7 - Command Injection

Title source: llm

Description

The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotefreebsd
https://www.exploit-db.com/exploits/16918
exploitdb WORKING POC VERIFIED
by Nicob · textwebappsmultiple
https://www.exploit-db.com/exploits/10431
metasploit WORKING POC EXCELLENT
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/misc/zabbix_agent_exec.rb

Scores

EPSS 0.6414
EPSS Percentile 98.4%

Details

CWE
CWE-264
Status published
Products (9)
zabbix/zabbix 1.1.2
zabbix/zabbix 1.1.3
zabbix/zabbix 1.1.4
zabbix/zabbix 1.1.5
zabbix/zabbix 1.4.2
zabbix/zabbix 1.4.3
zabbix/zabbix 1.4.4
zabbix/zabbix 1.4.6
zabbix/zabbix < 1.6.6
Published Dec 31, 2009
Tracked Since Feb 18, 2026