CVE-2009-4502
Zabbix Agent <1.6.7 - Command Injection
Title source: llmDescription
The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotefreebsd
https://www.exploit-db.com/exploits/16918
exploitdb
WORKING POC
VERIFIED
by Nicob · textwebappsmultiple
https://www.exploit-db.com/exploits/10431
metasploit
WORKING POC
EXCELLENT
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/misc/zabbix_agent_exec.rb
Scores
EPSS
0.6414
EPSS Percentile
98.4%
Details
CWE
CWE-264
Status
published
Products (9)
zabbix/zabbix
1.1.2
zabbix/zabbix
1.1.3
zabbix/zabbix
1.1.4
zabbix/zabbix
1.1.5
zabbix/zabbix
1.4.2
zabbix/zabbix
1.4.3
zabbix/zabbix
1.4.4
zabbix/zabbix
1.4.6
zabbix/zabbix
< 1.6.6
Published
Dec 31, 2009
Tracked Since
Feb 18, 2026