Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Sawtooth Software | Lighthouse Studio | * ~ 9.16.14 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A pre-authentication remote code execution vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14. The issue arises from the unsafe use of the `eval` function within the Perl CGI component `ciwweb.pl`, where attacker-supplied input inside `hid_Random_ACARAT` is directly passed to `eval`. This allows remote unauthenticated attackers to execute arbitrary Perl code on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-34300.yaml | POC Details |
| 2 | Sawtooth Lighthouse Studio存在模板注入漏洞CVE-2025-34300 | https://github.com/jisi-001/CVE-2025-34300POC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet