NeDi 1.9C allows an authenticated user to perform a SQL Injection in the Monitoring History function on the endpoint /Monitoring-History.php via the det HTTP GET parameter. This allows an attacker to access all the data in the database and obtain access to the NeDi application.
- https://n4nj0.github.io/advisories/nedi-multiple-vulnerabilities-i/
No PoCs found on GitHub currently.