目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-0282 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
栈缓冲区溢出
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Ivanti多款产品 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Ivanti Connect Secure(ICS)等都是美国Ivanti公司的产品。Ivanti Connect Secure是一款安全远程网络连接工具。Ivanti Policy Secure(IPS)是一个网络访问控制 (NAC) 解决方案。Ivanti Neurons是一款开创性的平台,能简化和自动化IT系统。 Ivanti多款产品存在安全漏洞,该漏洞源于存在基于堆栈的缓冲区溢出问题。攻击者利用该漏洞可以远程执行代码。以下产品及版本受到影响:Ivanti Connect Secure 22.7R2
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
IvantiConnect Secure 22.7R2 ~ 22.7R2.4 -
IvantiPolicy Secure 22.7R1 ~ 22.7R1.2 -
IvantiNeurons for ZTA gateways 22.7R2 ~ 22.7R2.3 -
二、漏洞 CVE-2025-0282 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/securexploit1/CVE-2025-0282POC详情
2Ivanti (unsecure connect) zero click unauthenticated code executionhttps://github.com/NyxanGoat/CVE-2025-0282-PoCPOC详情
3Safely detect if an Ivanti server is vulnerable to CVE-2025-0282https://github.com/BishopFox/CVE-2025-0282-checkPOC详情
4CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploitPOC详情
5# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]https://github.com/anonzoli/CVE-2025-0282-Full-versionPOC详情
6# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]https://github.com/AnonStorks/CVE-2025-0282-Full-versionPOC详情
7Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)https://github.com/watchtowrlabs/CVE-2025-0282POC详情
8PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gatewayshttps://github.com/sfewer-r7/CVE-2025-0282POC详情
9Exploit for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gatewayshttps://github.com/chiefchainer/CVE-2025-0282POC详情
10Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282https://github.com/AdaniKamal/CVE-2025-0282POC详情
11Nonehttps://github.com/44xo/CVE-2025-0282POC详情
12Exploit for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gatewayshttps://github.com/almanatra/CVE-2025-0282POC详情
13Ivanti Remote code executionhttps://github.com/punitdarji/Ivanti-CVE-2025-0282POC详情
14CVE-2025-0282https://github.com/B1ack4sh/Blackash-CVE-2025-0282POC详情
15Ivanti Connect Secure < 22.7R2.5, Ivanti Policy Secure < 22.7R1.2, and Ivanti Neurons for ZTA gateways < 22.7R2.3 contain a stack-based buffer overflow in the clientCapabilities parameter handling. This vulnerability allows remote unauthenticated attackers to execute arbitrary code through IF-T TLS requests. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0282.yamlPOC详情
16CVE-2025-0282https://github.com/Ashwesker/Blackash-CVE-2025-0282POC详情
17CVE-2025-0282https://github.com/Ashwesker/Ashwesker-CVE-2025-0282POC详情
18CVE-2025-0282https://github.com/gmh5225/Blackash-CVE-2025-0282POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-0282 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-0282

暂无评论


发表评论