exploitdb
WORKING POC
by Riadh Bouchahoua · pythonwebappsphp
https://www.exploit-db.com/exploits/51166
This exploit targets CVE-2022-46169 in Cacti v1.2.22, achieving remote command execution via command injection in the `remote_agent.php` endpoint. It uses a base64-encoded reverse shell payload and iterates over host and local data IDs to trigger execution.
Classification
Working Poc 95%
Target:
Cacti v1.2.2x <= 1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti instance · A listener set up for the reverse shell
nomisec
WORKING POC
47 stars
by 0xf4n9x · remote
https://github.com/0xf4n9x/CVE-2022-46169
This repository provides a working proof-of-concept for CVE-2022-46169, demonstrating an unauthenticated command injection vulnerability in Cacti's remote_agent.php via the poller_id parameter. It includes details on bypassing authentication using the X-Forwarded-For header and brute-forcing host_id and local_data_ids.
Classification
Working Poc 90%
Target:
Cacti (versions affected by CVE-2022-46169)
No auth needed
Prerequisites:
Access to the target Cacti instance · Ability to send crafted HTTP requests
nomisec
WORKING POC
41 stars
by FredBrave · remote
https://github.com/FredBrave/CVE-2022-46169-CACTI-1.2.22
This is a functional exploit for CVE-2022-46169, targeting Cacti 1.2.22. It achieves remote code execution (RCE) by injecting a reverse shell payload via the `remote_agent.php` endpoint, leveraging command injection in the `poller_id` parameter.
Classification
Working Poc 95%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Target URL · Attacker-controlled IP and port for reverse shell
nomisec
WORKING POC
29 stars
by sAsPeCt488 · remote
https://github.com/sAsPeCt488/CVE-2022-46169
This is a functional PoC for CVE-2022-46169, an unauthenticated RCE vulnerability in Cacti <= 1.2.22. It exploits a command injection flaw by chaining an authentication bypass with a malicious payload in the 'poller_id' parameter.
Classification
Working Poc 95%
Target:
Cacti <= 1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti instance · Cacti version <= 1.2.22
nomisec
WORKING POC
15 stars
by ariyaadinatha · remote
https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit
This PoC exploits CVE-2022-46169 in Cacti 1.2.22, leveraging an authentication bypass via `X-Forwarded-For` header manipulation and command injection through the `poller_item` parameter in `remote_agent.php`. It includes brute-forcing host/local data IDs and delivers a reverse shell payload.
Classification
Working Poc 95%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Target Cacti instance with `remote_agent.php` accessible · Valid `X-Forwarded-For` IP present in the `poller` table · Network connectivity to the target
nomisec
WORKING POC
9 stars
by c3rrberu5 · remote
https://github.com/c3rrberu5/CVE-2022-46169
This repository contains a Python-based exploit for CVE-2022-46169, an unauthenticated remote code execution vulnerability in Cacti 1.2.19. The exploit bypasses authentication via header manipulation, bruteforces valid host_id and local_data_ids, and injects commands via the poller_id parameter.
Classification
Working Poc 90%
Target:
Cacti 1.2.19
No auth needed
Prerequisites:
Network access to the target Cacti instance · Valid X-Forwarded header value for bypass
nomisec
WORKING POC
3 stars
by SystemVll · remote
https://github.com/SystemVll/CVE-2022-46169
This is a Python-based exploit for CVE-2022-46169, an unauthenticated command injection vulnerability in Cacti prior to version 1.2.22. The exploit sends a crafted HTTP request to the target's remote_agent.php endpoint with a malicious command injected via the poller_id parameter.
Classification
Working Poc 95%
Target:
Cacti prior to 1.2.22
No auth needed
Prerequisites:
Target must be running a vulnerable version of Cacti · Target's remote_agent.php endpoint must be accessible
nomisec
WORKING POC
3 stars
by ruycr4ft · remote
https://github.com/ruycr4ft/CVE-2022-46169
This exploit targets CVE-2022-46169 in Cacti 1.2.22, leveraging command injection via the `poller_id` parameter in `remote_agent.php`. It includes brute-forcing to identify valid host and local data IDs, then executes a reverse shell payload.
Classification
Working Poc 95%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Network access to the target · Cacti 1.2.22 with exposed `remote_agent.php`
nomisec
WORKING POC
3 stars
by icebreack · remote
https://github.com/icebreack/CVE-2022-46169
This is a functional exploit for CVE-2022-46169, targeting Cacti versions 1.2.2x up to 1.2.22. It leverages command injection via the `remote_agent.php` endpoint to execute a reverse shell payload, using base64 encoding and HTTP headers like `X-Forwarded-For` to bypass restrictions.
Classification
Working Poc 95%
Target:
Cacti 1.2.2x <= 1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti instance · A listener for the reverse shell · Knowledge of the target's local IP for `X-Forwarded-For`
nomisec
WORKING POC
3 stars
by JacobEbben · remote
https://github.com/JacobEbben/CVE-2022-46169_unauth_remote_code_execution
This is a functional exploit for CVE-2022-46169, an unauthenticated remote code execution vulnerability in Cacti. It leverages an authentication bypass via HTTP headers and command injection in the `remote_agent.php` endpoint to execute arbitrary commands, including a reverse shell.
Classification
Working Poc 95%
Target:
Cacti < 1.2.23 and < 1.3.0
No auth needed
Prerequisites:
Network access to the target Cacti instance · Attacker-controlled IP and port for reverse shell
nomisec
WORKING POC
3 stars
by N1arut · remote
https://github.com/N1arut/CVE-2022-46169_POC
This PoC exploits CVE-2022-46169, a command injection vulnerability in Cacti's remote_agent.php. It bypasses authentication via X-Forwarded-For headers and injects a reverse shell payload.
Classification
Working Poc 95%
Target:
Cacti (versions affected by CVE-2022-46169)
No auth needed
Prerequisites:
Network access to the target Cacti instance · Python environment with requests library
nomisec
WORKING POC
2 stars
by Habib0x0 · remote
https://github.com/Habib0x0/CVE-2022-46169
This is a functional exploit for CVE-2022-46169, targeting Cacti's unauthenticated remote command execution vulnerability. It bypasses authentication via X-Forwarded header manipulation, brute-forces valid host_id and local_data_ids, and delivers a reverse shell payload.
Classification
Working Poc 95%
Target:
Cacti 1.2.17-22
No auth needed
Prerequisites:
Network access to the target Cacti instance · Valid X-Forwarded header value for authentication bypass · Listener set up for reverse shell
nomisec
WORKING POC
1 stars
by 0xN7y · remote
https://github.com/0xN7y/CVE-2022-46169
This exploit leverages an authentication bypass via HTTP header manipulation (X-Forwarded-For) and command injection in the 'poller_id' parameter to achieve remote code execution (RCE) in Cacti versions before 1.2.3. It attempts multiple reverse shell payloads to establish a connection back to the attacker.
Classification
Working Poc 95%
Target:
Cacti < 1.2.3
No auth needed
Prerequisites:
Network access to the target Cacti instance · Target must be running a vulnerable version of Cacti (< 1.2.3)
github
WORKING POC
1 stars
by Shockp · pythonpoc
https://github.com/Shockp/CVE-Exploits/tree/main/CVE-2022-46169 (cacti 1.22)
The repository contains functional exploit code for CVE-2022-46169, targeting Cacti 1.2.2. The exploit demonstrates remote code execution (RCE) by leveraging command injection in the vulnerable software.
Classification
Working Poc 95%
Target:
Cacti 1.2.2
No auth needed
Prerequisites:
Target IP and port · Attacker-controlled server to host payload
nomisec
WORKING POC
1 stars
by copyleftdev · remote
https://github.com/copyleftdev/PricklyPwn
This Go-based exploit targets CVE-2022-46169, a command injection vulnerability in Cacti's remote_agent.php. It sends a base64-encoded reverse shell payload via the polldata action, leveraging unauthenticated HTTP requests.
Classification
Working Poc 95%
Target:
Cacti up to v1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti instance · Listener for reverse shell on attacker's machine
nomisec
WORKING POC
1 stars
by Safarchand · remote
https://github.com/Safarchand/CVE-2022-46169
This is a functional PoC for CVE-2022-46169, an unauthenticated RCE vulnerability in Cacti <= 1.2.22. It exploits command injection via the 'poller_id' parameter in 'remote_agent.php' to execute a reverse shell.
Classification
Working Poc 95%
Target:
Cacti <= 1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti instance · Attacker-controlled listener for reverse shell
nomisec
WORKING POC
1 stars
by m3ssap0 · poc
https://github.com/m3ssap0/cacti-rce-cve-2022-46169-vulnerable-application
This repository provides a vulnerable Dockerized Cacti v1.2.22 environment and a Python exploit for CVE-2022-46169, a command injection vulnerability allowing unauthenticated RCE. The exploit leverages a specific data source configuration to execute arbitrary commands.
Classification
Working Poc 100%
Target:
Cacti v1.2.22
No auth needed
Prerequisites:
Cacti v1.2.22 with a device configured to use the 'Uptime' graph template · Network access to the Cacti web interface
nomisec
SCANNER
1 stars
by 0x0Jackal · poc
https://github.com/0x0Jackal/CVE-2022-46169
The repository contains a Python script that checks for the presence of CVE-2022-46169 by sending a crafted HTTP request to the target URL and checking for a specific response pattern. It does not exploit the vulnerability but scans for its conditions.
Classification
Scanner 90%
Target:
Cacti (versions with vulnerable remote_agent.php)
No auth needed
Prerequisites:
Target must have Cacti installed with a vulnerable version of remote_agent.php
nomisec
SCANNER
1 stars
by doosec101 · remote
https://github.com/doosec101/CVE-2022-46169
This repository contains a Python script that checks for the presence of CVE-2022-46169, a command injection vulnerability in Cacti's remote_agent.php. The script sends a request to a specific endpoint and checks for a 'FATAL:' response to indicate potential vulnerability.
Classification
Scanner 90%
Target:
Cacti (versions with vulnerable remote_agent.php)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Cacti with the specific data source selected
nomisec
WORKING POC
1 stars
by taythebot · remote
https://github.com/taythebot/CVE-2022-46169
This repository contains a Go-based bruteforce tool for CVE-2022-46169, a blind RCE vulnerability in Cacti. It bypasses IP whitelisting via X-Forwarded-For header spoofing and enumerates valid host_id and local_data_ids parameters to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Cacti (versions affected by CVE-2022-46169)
No auth needed
Prerequisites:
Access to the target Cacti instance · Valid host_id and local_data_ids parameters (bruteforced by the tool)
nomisec
WRITEUP
by nicostan15 · poc
https://github.com/nicostan15/CVE-2022-46169
This repository provides a detailed technical analysis and step-by-step guide for reproducing CVE-2022-46169, an unauthenticated command injection vulnerability in Cacti ≤ 1.2.22. It includes setup instructions, exploitation steps, and verification methods, but lacks actual exploit code.
Classification
Writeup 90%
Target:
Cacti ≤ 1.2.22
No auth needed
Prerequisites:
Cacti version ≤ 1.2.22 · At least one poller_item with action = 2 in the database · Access to remote_agent.php endpoint
nomisec
WORKING POC
by alv-david · remote
https://github.com/alv-david/CVE-2022-46169-Cacti-1.2.22
This is a functional exploit for CVE-2022-46169, targeting Cacti's remote_agent.php. It leverages command injection via the poller_id parameter to achieve remote code execution (RCE) and includes both brute-force and direct execution modes.
Classification
Working Poc 95%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti instance · Valid host_id and local_data_id or brute-force range
nomisec
WORKING POC
by RdBBB3 · remote
https://github.com/RdBBB3/SHELL-POC-CVE-2022-46169
This is a functional proof-of-concept exploit for CVE-2022-46169, targeting a command injection vulnerability in Cacti's remote_agent.php. It crafts a reverse shell payload, URL-encodes it, and sends it to a vulnerable endpoint after validating the target's vulnerability.
Classification
Working Poc 95%
Target:
Cacti (versions affected by CVE-2022-46169)
No auth needed
Prerequisites:
Vulnerable Cacti instance · Network access to the target · Listener set up on attacker's machine
nomisec
WORKING POC
by lof1sec · remote
https://github.com/lof1sec/CVE-2022-46169
This PoC exploits CVE-2022-46169, an unauthenticated command injection vulnerability in Cacti v1.2.22. It brute-forces host and local data IDs, then injects a reverse shell payload via the `poller_id` parameter in `remote_agent.php`.
Classification
Working Poc 95%
Target:
Cacti v1.2.22
No auth needed
Prerequisites:
Target Cacti instance with vulnerable version · Network access to the target · Attacker-controlled IP and port for reverse shell
nomisec
WRITEUP
by HPT-Intern-Task-Submission · remote
https://github.com/HPT-Intern-Task-Submission/CVE-2022-46169
This repository provides a detailed writeup and lab setup for CVE-2022-46169, an unauthenticated remote code execution vulnerability in Cacti. It explains the authentication bypass via IP spoofing and command injection in the `remote_agent.php` file.
Classification
Writeup 90%
Target:
Cacti < 1.2.23
No auth needed
Prerequisites:
Docker environment · Cacti instance running a vulnerable version
nomisec
WORKING POC
by mind2hex · remote
https://github.com/mind2hex/CVE-2022-46169-Cacti-v1.2.22-RCE
This PoC exploits CVE-2022-46169, a command injection vulnerability in Cacti v1.2.22 via the `remote_agent.php` endpoint. It brute-forces `host_id` and `local_data_id` parameters, then injects commands through the `poller_id` parameter.
Classification
Working Poc 95%
Target:
Cacti v1.2.22
No auth needed
Prerequisites:
Network access to Cacti instance · Cacti v1.2.22 with vulnerable endpoint exposed
nomisec
WORKING POC
by 0xZon · remote
https://github.com/0xZon/CVE-2022-46169-Exploit
This is a working exploit for CVE-2022-46169, an unauthenticated RCE vulnerability in Cacti 1.2.22. It leverages command injection via the `remote_agent.php` endpoint to spawn a reverse shell.
Classification
Working Poc 95%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Network access to the target · Listener set up for reverse shell
nomisec
WORKING POC
by a1665454764 · remote
https://github.com/a1665454764/CVE-2022-46169
This repository contains a Python-based PoC for CVE-2022-46169, a remote command execution vulnerability in Cacti's remote_agent.php. The exploit leverages command injection via the X-Forwarded-For header to execute arbitrary commands on vulnerable Cacti instances.
Classification
Working Poc 90%
Target:
Cacti < 1.2.17-1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti instance · Vulnerable version of Cacti (1.2.17-1.2.22)
nomisec
WORKING POC
by dawnl3ss · remote
https://github.com/dawnl3ss/CVE-2022-46169
This PoC exploits CVE-2022-46169 in Cacti 1.2.22, leveraging an authentication bypass via `X-Forwarded-For` header manipulation and command injection through `proc_open` in the `polldata` action. It includes brute-forcing host/local data IDs and delivers a reverse shell payload.
Classification
Working Poc 95%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Target Cacti instance with `remote_agent.php` accessible · Valid `X-Forwarded-For` IP in the `poller` table · Network connectivity for reverse shell
nomisec
WORKING POC
by antisecc · remote
https://github.com/antisecc/CVE-2022-46169
This PoC exploits CVE-2022-46169, an unauthenticated RCE vulnerability in Cacti <= 1.2.22 via command injection in the 'poller_id' parameter of remote_agent.php. It iterates through host_ids and injects a command via a crafted HTTP request.
Classification
Working Poc 95%
Target:
Cacti <= 1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti instance · Cacti version <= 1.2.22
nomisec
WORKING POC
by Rickster5555 · remote
https://github.com/Rickster5555/EH2-PoC
This repository contains a functional PoC for CVE-2022-46169, an unauthenticated command injection vulnerability in Cacti versions 1.2.17 to 1.2.22. The exploit leverages a crafted HTTP GET request to execute arbitrary commands via the `poller_id` parameter in `remote_agent.php`.
Classification
Working Poc 95%
Target:
Cacti 1.2.17 to 1.2.22
No auth needed
Prerequisites:
Cacti instance with a specific graph type configured (e.g., 'Device - Uptime')
nomisec
WORKING POC
by BKreisel · remote
https://github.com/BKreisel/CVE-2022-46169
This is a Python-based exploit for CVE-2022-46169, targeting Cacti versions <= 1.2.22. It brute-forces host and data IDs to craft a reverse shell payload via command injection in the `remote_agent.php` endpoint.
Classification
Working Poc 95%
Target:
Cacti <= 1.2.22
No auth needed
Prerequisites:
Network access to the target Cacti server · Listener set up for reverse shell callback
nomisec
WORKING POC
by nou-man · remote
https://github.com/nou-man/CVE-2022-46169
This is a functional exploit for CVE-2022-46169, targeting Cacti versions >=1.2.22. It leverages command injection via the `poller_id` parameter in `remote_agent.php` to achieve remote code execution (RCE) and spawn a reverse shell.
Classification
Working Poc 95%
Target:
Cacti >=1.2.22
No auth needed
Prerequisites:
Network access to the target · Target must be vulnerable to CVE-2022-46169
nomisec
WORKING POC
by r1nzleer · poc
https://github.com/r1nzleer/RCE-Cacti-1.2.22
This is a Python-based exploit for CVE-2022-46169, targeting an unauthenticated RCE vulnerability in Cacti 1.2.22. It bypasses authentication via X-Forwarded-For header manipulation and brute-forces valid host_id and local_data_ids[] parameters before injecting a reverse shell command.
Classification
Working Poc 95%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Network access to the target · Cacti 1.2.22 with exposed remote_agent.php · Valid reverse shell listener for payload execution
nomisec
WORKING POC
by yassinebk · remote
https://github.com/yassinebk/CVE-2022-46169
This PoC exploits an unauthenticated command injection vulnerability in Cacti (CVE-2022-46169) to achieve remote code execution. It brute-forces host and local data IDs to inject a reverse shell payload via the `poller_id` parameter.
Classification
Working Poc 95%
Target:
Cacti versions through 1.2.22
No auth needed
Prerequisites:
Target Cacti instance with vulnerable version · Network access to the target · Valid host ID and local data ID (brute-forced by the script)
nomisec
WORKING POC
by devilgothies · remote
https://github.com/devilgothies/CVE-2022-46169
This is a functional exploit for CVE-2022-46169, an unauthenticated command injection vulnerability in Cacti 1.2.22. It leverages improper input validation in the 'poller_id' parameter to achieve remote code execution via a reverse shell.
Classification
Working Poc 100%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Target must be running Cacti 1.2.22 · Network access to the target's remote_agent.php endpoint
nomisec
WORKING POC
by devAL3X · poc
https://github.com/devAL3X/CVE-2022-46169_poc
This repository contains a Go-based proof-of-concept exploit for CVE-2022-46169, targeting Cacti versions <1.2.23. The exploit leverages an authentication bypass and command injection vulnerability in the `remote_agent.php` endpoint to achieve unauthenticated remote code execution.
Classification
Working Poc 95%
Target:
Cacti <1.2.23
No auth needed
Prerequisites:
Network access to the target Cacti instance · Vulnerable Cacti version (<1.2.23)
nomisec
WORKING POC
by svchost9913 · poc
https://github.com/svchost9913/CVE-2022-46169_unauth_remote_code_execution
This repository contains a functional exploit for CVE-2022-46169, an unauthenticated remote code execution vulnerability in Cacti. The exploit leverages an authentication bypass via HTTP headers and command injection in the `remote_agent.php` endpoint.
Classification
Working Poc 95%
Target:
Cacti < 1.2.23 and < 1.3.0
No auth needed
Prerequisites:
Network access to the target Cacti instance · Valid attacker IP and port for reverse shell
nomisec
SCANNER
by miko550 · remote
https://github.com/miko550/CVE-2022-46169
This repository contains a Python script that checks for the presence of CVE-2022-46169, an authentication bypass vulnerability in Cacti. The script attempts to bypass authentication via X-Forwarded-For header manipulation and brute-forces host and local data IDs to identify vulnerable endpoints.
Classification
Scanner 90%
Target:
Cacti (versions affected by CVE-2022-46169)
No auth needed
Prerequisites:
Network access to the target Cacti instance · The remote_agent.php endpoint must be accessible
nomisec
WORKING POC
by imjdl · remote
https://github.com/imjdl/CVE-2022-46169
This PoC exploits CVE-2022-46169, a command injection vulnerability in Cacti's `remote_agent.php`. It brute-forces valid `local_data_ids` and `host_id` parameters, then injects commands via the `poller_id` parameter, writing output to a randomly named file for retrieval.
Classification
Working Poc 95%
Target:
Cacti (versions before 1.2.22)
No auth needed
Prerequisites:
Network access to the target Cacti instance · The `remote_agent.php` endpoint must be accessible
vulncheck_xdb
WORKING POC
remote
https://github.com/ahanel13/CVE-2022-4616-POC
This repository contains a functional Python script that exploits CVE-2022-46169, a command injection vulnerability in Cacti's `remote_agent.php`. The script automates the exploitation process by setting up an HTTP server to receive command output and sending crafted payloads to the target.
Classification
Working Poc 95%
Target:
Cacti (version not specified, but likely 1.2.22 or earlier)
No auth needed
Prerequisites:
Network access to the target Cacti instance · Python 3.x environment
vulncheck_xdb
WORKING POC
remote
https://github.com/sha-16/RCE-Cacti-1.2.22
This repository contains a functional Python exploit for CVE-2022-46169, an unauthenticated remote code execution vulnerability in Cacti 1.2.22. The exploit bypasses authentication via the X-Forwarded-For header and injects commands into the poller_id parameter.
Classification
Working Poc 95%
Target:
Cacti 1.2.22
No auth needed
Prerequisites:
Network access to the target · Cacti remote_agent.php endpoint exposed
metasploit
WORKING POC
EXCELLENT
by Stefan Schiller, Steven Seeley, Owen Gong, Erik Wynter · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/cacti_unauthenticated_cmd_injection.rb
This Metasploit module exploits an unauthenticated command injection vulnerability in Cacti (CVE-2022-46169) by sending a crafted GET request to /remote_agent.php with malicious parameters, leading to remote code execution as the www-data user.
Classification
Working Poc 100%
Target:
Cacti 1.2.22 and earlier
No auth needed
Prerequisites:
Target must be running a vulnerable version of Cacti · Network access to the target's web interface