Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/huseyinstif/CVE-2025-24016-Nuclei-Template | POC Details |
| 2 | CVE-2025-24016 | https://github.com/0xjessie21/CVE-2025-24016 | POC Details |
| 3 | CVE-2025-24016: RCE in Wazuh server! Remote Code Execution | https://github.com/MuhammadWaseem29/CVE-2025-24016 | POC Details |
| 4 | None | https://github.com/celsius026/poc_CVE-2025-24016 | POC Details |
| 5 | A critical Remote Code Execution (RCE) vulnerability exists in Wazuh server versions >= 4.4.0 and < 4.9.1. The vulnerability occurs due to unsafe deserialization in the wazuh-manager package, specifically in the DistributedAPI where parameters are serialized as JSON and deserialized using as_wazuh_object in the framework/wazuh/core/cluster/common.py file. An attacker with API access can exploit this vulnerability by injecting an unsanitized dictionary into DAPI requests, leading to arbitrary Python code execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-24016.yaml | POC Details |
| 6 | A critical RCE vulnerability has been identified in the Wazuh server due to unsafe deserialization in the wazuh-manager package. This bug affects Wazuh versions ≥ 4.4.0 and has been patched in version 4.9.1. | https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC | POC Details |
| 7 | Detection for CVE-2025-24016 - Deserialization of Untrusted Data Vulnerability in the Wazuh software | https://github.com/rxerium/CVE-2025-24016 | POC Details |
| 8 | CVE-2025-24016 | https://github.com/B1ack4sh/Blackash-CVE-2025-24016 | POC Details |
| 9 | Wazuh 8.4 CVE-2025-24016 | https://github.com/guinea-offensive-security/Wazuh-RCE | POC Details |
| 10 | CVE-2025-24016: RCE in Wazuh server! Remote Code Execution | https://github.com/GloStarRx1/CVE-2025-24016 | POC Details |
| 11 | CVE-2025-24016 | https://github.com/Ashwesker/Blackash-CVE-2025-24016 | POC Details |
| 12 | CVE-2025-24016 | https://github.com/Ashwesker/Ashwesker-CVE-2025-24016 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet