Exploit for CVE-2026-22886

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires
authentication. However, the product ships with a default administrative account (admin/
admin) and does not enforce a mandatory password change on first use. After the first
successful login, the server continues to accept the default password indefinitely without
warning or enforcement.

In real-world deployments, this service is often left enabled without changing the default
credentials. As a result, a remote attacker with access to the service port could authenticate
as an administrator and gain full control of the protocol’s administrative features.

Published: 2026-03-03

CVSS: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download Exploit for CVE-2026-22886 here:

Use Tor Browser to access .onion site.

https://sonitex.com/exploit-614-cve-2026-30844/

https://sonitex.com/exploit-9-cve-2026-26980/

https://sonitex.com/exploit-799-cve-2026-28384/