Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-27591
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
below 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
below是Meta Incubator开源的一个现代 Linux 系统的资源监视器。 below v0.9.0之前版本存在安全漏洞,该漏洞源于创建了全局可写目录,可能导致通过符号链接攻击提升到root权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Meta Platforms, Incbelow 0.0.0 ~ 0.9.0 -
II. Public POCs for CVE-2025-27591
#POC DescriptionSource LinkShenlong Link
1CVE-2025-27591https://github.com/obamalaolu/CVE-2025-27591POC Details
2Below v0.8.1 - Local Privilege Escalation (CVE-2025-27591) - PoC Exploithttps://github.com/rvizx/CVE-2025-27591POC Details
3CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0https://github.com/BridgerAlderson/CVE-2025-27591-PoCPOC Details
4CVE-2025-27591https://github.com/DarksBlackSk/CVE-2025-27591POC Details
5CVE-2025-27591 is a known privilege escalation vulnerability in the Below service (version < v0.9.0)https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591POC Details
6Nonehttps://github.com/alialucas7/CVE-2025-27591_PoCPOC Details
7A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below ≤ v0.8.1https://github.com/incommatose/CVE-2025-27591-PoCPOC Details
8🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injectionhttps://github.com/00xCanelo/CVE-2025-27591POC Details
9Nonehttps://github.com/Thekin-ctrl/CVE-2025-27591-BelowPOC Details
10a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.https://github.com/Cythonic1/CVE-2025-27591POC Details
11Below <v0.9.0 PoC Privilege Escalation Exploithttps://github.com/umutcamliyurt/CVE-2025-27591POC Details
12PoC for CVE-2025-27591 – Local privilege escalation in the below monitoring tool. By symlinking its log file to /etc/passwd, an attacker can inject a root account and gain full system compromise.https://github.com/danil-koltsov/below-log-race-pocPOC Details
13Local Privilege Escalation vai `below` (CVE-2025-27591) - PoC Exploithttps://github.com/HOEUN-Visai/CVE-2025-27591-below-POC Details
14CVE-2025-27591https://github.com/krn966/CVE-2025-27591POC Details
15A Bash-based privilege escalation exploit targeting the `below` system performance monitoring tool. This refurbished exploit leverages a symlink vulnerability in the logging mechanism to inject a root user into `/etc/passwd`, achieving full root access.https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591POC Details
16self cleaning CVE-2025-27591 Poc that grants a root reverse shell instead of modifying passwd fileshttps://github.com/0x00Jeff/CVE-2025-27591POC Details
17Local Privilege Escalation vai `below` (CVE-2025-27591) - PoC Exploithttps://github.com/VisaiCyber/CVE-2025-27591-below-POC Details
18Exploit for CVE-2025-27591 (for educational purposes)https://github.com/Stp1t/CVE-2025-27591POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-27591
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-27591

No comments yet


Leave a comment