目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-52691 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Upload Arbitrary Files
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
SmarterTools SmarterMail 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
SmarterTools SmarterMail是SmarterTools公司的一套邮件服务器软件。该软件支持垃圾邮件过滤、数据统计、简单邮件传输协议SMTP验证等功能。 SmarterTools SmarterMail存在安全漏洞,该漏洞源于未经验证的攻击者可上传任意文件,可能导致远程代码执行。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
SmarterToolsSmarterMail SmarterMail versions Build 9406 and earlier -
二、漏洞 CVE-2025-52691 的公开POC
#POC 描述源链接神龙链接
1Mail server contains an unrestricted file upload vulnerability allowing unauthenticated attackers to upload arbitrary files to any location, potentially enabling remote code execution. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-52691.yamlPOC详情
2Nonehttps://github.com/yt2w/CVE-2025-52691POC详情
3Detection for CVE-2025-52691https://github.com/rxerium/CVE-2025-52691POC详情
4CVE-2025-52691https://github.com/Ashwesker/Ashwesker-CVE-2025-52691POC详情
5This repository contains a safe Proof of Concept (PoC) to detect vulnerable SmarterMail versions affected by CVE‑2025‑52691. The script performs version detection only and does not exploit the vulnerability.https://github.com/you-ssef9/CVE-2025-52691POC详情
6An enhanced proof-of-concept exploit for CVE-2025-52691 (SmarterMail Arbitrary File Upload RCE) with APT-level features like stealth obfuscation, persistence, exfiltration, and interactive mode. For educational and authorized testing only. Credits to the original PoC by yt2w/CVE-2025-52691.https://github.com/DeathShotXD/CVE-2025-52691-APT-PoCPOC详情
7Nonehttps://github.com/sajjadsiam/CVE-2025-52691-pocPOC详情
8CVE‑2025‑52691 - SmarterMail Arbitrary File Upload Vulnerabilityhttps://github.com/hilwa24/CVE-2025-52691POC详情
9CVE-2025-52691 Scanner - Detects vulnerable SmarterMail installations (CVSS 10.0 RCE)https://github.com/nxgn-kd01/smartermail-cve-scannerPOC详情
10Nonehttps://github.com/watchtowrlabs/watchTowr-vs-SmarterMail-CVE-2025-52691POC详情
11Nonehttps://github.com/rimbadirgantara/CVE-2025-52691-pocPOC详情
12CVE-2025-52691https://github.com/mohammadzarnian1357/Ashwesker-CVE-2025-52691POC详情
13CVE-2025-52691 PoC: Based on watchtowr's article WT-2026-0001 about an authentication bypass exploit, this one is a functional Python attack script.https://github.com/ninjazan420/CVE-2025-52691-PoC-SmarterMail-authentication-bypass-exploit-WT-2026-0001POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-52691 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-52691

暂无评论


发表评论