### [CVE-2021-33525](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33525) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ArianeBlow/EyesOfNetwork-vuln-checker - https://github.com/ArianeBlow/LilacPathVUln