Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/gopinaath/CVE-2025-49844-discovery | POC Details |
| 2 | CVE-2025-49844 – Redis Lua Parser Use-After-Free | https://github.com/dwisiswant0/CVE-2025-49844 | POC Details |
| 3 | CVE-2025-49844 (RediShell) | https://github.com/raminfp/redis_exploit | POC Details |
| 4 | None | https://github.com/lastvocher/redis-CVE-2025-49844 | POC Details |
| 5 | Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits. | https://github.com/srozb/reditrap | POC Details |
| 6 | None | https://github.com/pedrorichil/CVE-2025-49844 | POC Details |
| 7 | A powerful Redis exploitation tool that leverages CVE-2025-4984 | https://github.com/Yuri08loveElaina/CVE-2025-49844 | POC Details |
| 8 | CVE-2025-49844 POC | https://github.com/YuanBenSir/CVE-2025-49844_POC | POC Details |
| 9 | CVE-2025-49844 checker | https://github.com/Mufti22/CVE-2025-49844-RediShell-Vulnerability-Scanner | POC Details |
| 10 | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2025/CVE-2025-49844.yaml | POC Details |
| 11 | None | https://github.com/imbas007/CVE-2025-49844-Vulnerability-Scanner | POC Details |
| 12 | PoC of RediShell | https://github.com/angelusrivera/CVE-2025-49844 | POC Details |
| 13 | CVE-2025-49844 POC | https://github.com/MiclelsonCN/CVE-2025-49844_POC | POC Details |
| 14 | 🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research. | https://github.com/ksnnd32/redis_exploit | POC Details |
| 15 | 🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access. | https://github.com/Zain3311/CVE-2025-49844 | POC Details |
| 16 | اسکپلویت اسیب پذیری CVE-2025-49844 | https://github.com/elyasbassir/CVE-2025-49844 | POC Details |
| 17 | CVE-2025-49844 | https://github.com/B1ack4sh/Blackash-CVE-2025-49844 | POC Details |
| 18 | Proof-of-concept for CVE-2025-49844 | https://github.com/saneki/cve-2025-49844 | POC Details |
| 19 | Untested completition of the Redishell PoC made by AI | https://github.com/Network-Sec/CVE-2025-49844-RediShell-AI-made-Revshell | POC Details |
| 20 | CVE-2025-49844 | https://github.com/Ashwesker/Blackash-CVE-2025-49844 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet