Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-22457
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
栈缓冲区溢出
Source: NVD (National Vulnerability Database)
Vulnerability Title
Ivanti Connect Secure 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Ivanti Connect Secure(ICS)是美国Ivanti公司的一款安全远程网络连接工具。 Ivanti Connect Secure存在安全漏洞,该漏洞源于栈缓冲区溢出,可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
IvantiConnect Secure 22.7R2.6 -
IvantiPolicy Secure 22.7R1.4 -
IvantiNeurons for ZTA gateways 22.8R2.2 -
II. Public POCs for CVE-2025-22457
#POC DescriptionSource LinkShenlong Link
1Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPNhttps://github.com/Vinylrider/ivantiunlockerPOC Details
2CVE-2025-22457 Python and Metasploit PoC for Ivanti unauthenticated RCEhttps://github.com/N4SL1/CVE-2025-22457-PoCPOC Details
3PoC for CVE-2025-22457https://github.com/sfewer-r7/CVE-2025-22457POC Details
4CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCEhttps://github.com/securekomodo/CVE-2025-22457POC Details
5Nonehttps://github.com/llussiess/CVE-2025-22457POC Details
6PoC CVE-2025-22457https://github.com/TRone-ux/CVE-2025-22457POC Details
7CVE-2025-22457https://github.com/B1ack4sh/Blackash-CVE-2025-22457POC Details
8Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 contain a stack-based buffer overflow caused by improper input handling, allowing remote attackers to execute arbitrary code without authentication. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-22457.yamlPOC Details
9CVE-2025-22457https://github.com/Ashwesker/Blackash-CVE-2025-22457POC Details
10CVE-2025-22457https://github.com/Ashwesker/Ashwesker-CVE-2025-22457POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-22457
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-22457
Anonymous User
2026-01-15 06:08:48

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment