Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Gladinet | CentreStack | 0 ~ 16.4.10315.56368 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-30406.yaml | POC Details |
| 2 | Exploit for CVE-2025-30406 | https://github.com/W01fh4cker/CVE-2025-30406 | POC Details |
| 3 | CVE-2025-30406 ViewState Exploit PoC | https://github.com/mchklt/CVE-2025-30406 | POC Details |
| 4 | Explore the CVE-2025-30406 ViewState exploit PoC for ASP.NET applications. Test security with this script and learn about deserialization vulnerabilities. 🐙 | https://github.com/Gersonaze/CVE-2025-30406 | POC Details |
| 5 | None | https://github.com/threadpoolx/CVE-2025-30406-CentreStack-Triofox-Deserialization-RCE | POC Details |
| 6 | 💻 Demonstrate a ViewState deserialization exploit for CVE-2025-30406 in ASP.NET, enabling remote code execution with a Proof-of-Concept script. | https://github.com/jaydenb546/CVE-2025-30406 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet