Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-0282
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
栈缓冲区溢出
Source: NVD (National Vulnerability Database)
Vulnerability Title
Ivanti多款产品 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Ivanti Connect Secure(ICS)等都是美国Ivanti公司的产品。Ivanti Connect Secure是一款安全远程网络连接工具。Ivanti Policy Secure(IPS)是一个网络访问控制 (NAC) 解决方案。Ivanti Neurons是一款开创性的平台,能简化和自动化IT系统。 Ivanti多款产品存在安全漏洞,该漏洞源于存在基于堆栈的缓冲区溢出问题。攻击者利用该漏洞可以远程执行代码。以下产品及版本受到影响:Ivanti Connect Secure 22.7R2
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
IvantiConnect Secure 22.7R2 ~ 22.7R2.4 -
IvantiPolicy Secure 22.7R1 ~ 22.7R1.2 -
IvantiNeurons for ZTA gateways 22.7R2 ~ 22.7R2.3 -
II. Public POCs for CVE-2025-0282
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/securexploit1/CVE-2025-0282POC Details
2Ivanti (unsecure connect) zero click unauthenticated code executionhttps://github.com/NyxanGoat/CVE-2025-0282-PoCPOC Details
3Safely detect if an Ivanti server is vulnerable to CVE-2025-0282https://github.com/BishopFox/CVE-2025-0282-checkPOC Details
4CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploitPOC Details
5# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]https://github.com/anonzoli/CVE-2025-0282-Full-versionPOC Details
6# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]https://github.com/AnonStorks/CVE-2025-0282-Full-versionPOC Details
7Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)https://github.com/watchtowrlabs/CVE-2025-0282POC Details
8PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gatewayshttps://github.com/sfewer-r7/CVE-2025-0282POC Details
9Exploit for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gatewayshttps://github.com/chiefchainer/CVE-2025-0282POC Details
10Ivanti Connect Secure, Policy Secure & ZTA Gateways - CVE-2025-0282https://github.com/AdaniKamal/CVE-2025-0282POC Details
11Nonehttps://github.com/44xo/CVE-2025-0282POC Details
12Exploit for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gatewayshttps://github.com/almanatra/CVE-2025-0282POC Details
13Ivanti Remote code executionhttps://github.com/punitdarji/Ivanti-CVE-2025-0282POC Details
14CVE-2025-0282https://github.com/B1ack4sh/Blackash-CVE-2025-0282POC Details
15Ivanti Connect Secure < 22.7R2.5, Ivanti Policy Secure < 22.7R1.2, and Ivanti Neurons for ZTA gateways < 22.7R2.3 contain a stack-based buffer overflow in the clientCapabilities parameter handling. This vulnerability allows remote unauthenticated attackers to execute arbitrary code through IF-T TLS requests. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0282.yamlPOC Details
16CVE-2025-0282https://github.com/Ashwesker/Blackash-CVE-2025-0282POC Details
17CVE-2025-0282https://github.com/Ashwesker/Ashwesker-CVE-2025-0282POC Details
18CVE-2025-0282https://github.com/gmh5225/Blackash-CVE-2025-0282POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-0282
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-0282

No comments yet


Leave a comment