
CVE-2018-9276
- Reference to the description:
- Description:
- An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
- Last updated date:
- 03/14/2025
Reports

ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- MEDIUM
- Date of publishing:
- 02/04/2025
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/31/2019
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 04/12/2021
- Reference url to background
http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 04/12/2021
- Reference url to background
http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 04/12/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 07/29/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 08/27/2021