Proof-of-concept exploit for pfBlockerNG <= 2.1.4_26, allows remote code execution, requires Python 3.x and requests and concurrent.futures modules, supports single and multiple targets, can write output to a file
Reporter | Title | Published | Views | Family All 24 |
---|---|---|---|---|
![]() | Exploit for OS Command Injection in Netgate Pfblockerng | 1 Mar 202313:24 | – | githubexploit |
![]() | Exploit for OS Command Injection in Netgate Pfblockerng | 23 Jul 202409:44 | – | githubexploit |
![]() | Exploit for OS Command Injection in Netgate Pfblockerng | 5 Mar 202300:56 | – | githubexploit |
![]() | Exploit for OS Command Injection in Netgate Pfblockerng | 5 Mar 202300:56 | – | githubexploit |
![]() | Exploit for OS Command Injection in Netgate Pfblockerng | 16 Jan 202513:59 | – | githubexploit |
![]() | Exploit for OS Command Injection in Netgate Pfblockerng | 12 Aug 202412:50 | – | githubexploit |
![]() | Exploit for OS Command Injection in Netgate Pfblockerng | 18 Sep 202211:10 | – | githubexploit |
![]() | pfSense pfBlockerNG 2.1.4_26 Shell Upload | 17 Oct 202200:00 | – | packetstorm |
![]() | pfBlockerNG 2.1.4_26 Remote Code Execution | 27 Feb 202300:00 | – | packetstorm |
![]() | CVE-2022-31814 | 5 Sep 202200:00 | – | cvelist |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo