Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SmarterTools | SmarterMail | SmarterMail versions Build 9406 and earlier | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Mail server contains an unrestricted file upload vulnerability allowing unauthenticated attackers to upload arbitrary files to any location, potentially enabling remote code execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-52691.yaml | POC Details |
| 2 | None | https://github.com/yt2w/CVE-2025-52691 | POC Details |
| 3 | Detection for CVE-2025-52691 | https://github.com/rxerium/CVE-2025-52691 | POC Details |
| 4 | CVE-2025-52691 | https://github.com/Ashwesker/Ashwesker-CVE-2025-52691 | POC Details |
| 5 | This repository contains a safe Proof of Concept (PoC) to detect vulnerable SmarterMail versions affected by CVE‑2025‑52691. The script performs version detection only and does not exploit the vulnerability. | https://github.com/you-ssef9/CVE-2025-52691 | POC Details |
| 6 | An enhanced proof-of-concept exploit for CVE-2025-52691 (SmarterMail Arbitrary File Upload RCE) with APT-level features like stealth obfuscation, persistence, exfiltration, and interactive mode. For educational and authorized testing only. Credits to the original PoC by yt2w/CVE-2025-52691. | https://github.com/DeathShotXD/CVE-2025-52691-APT-PoC | POC Details |
| 7 | None | https://github.com/sajjadsiam/CVE-2025-52691-poc | POC Details |
| 8 | CVE‑2025‑52691 - SmarterMail Arbitrary File Upload Vulnerability | https://github.com/hilwa24/CVE-2025-52691 | POC Details |
| 9 | CVE-2025-52691 Scanner - Detects vulnerable SmarterMail installations (CVSS 10.0 RCE) | https://github.com/nxgn-kd01/smartermail-cve-scanner | POC Details |
| 10 | None | https://github.com/watchtowrlabs/watchTowr-vs-SmarterMail-CVE-2025-52691 | POC Details |
| 11 | None | https://github.com/rimbadirgantara/CVE-2025-52691-poc | POC Details |
| 12 | CVE-2025-52691 | https://github.com/mohammadzarnian1357/Ashwesker-CVE-2025-52691 | POC Details |
| 13 | CVE-2025-52691 PoC: Based on watchtowr's article WT-2026-0001 about an authentication bypass exploit, this one is a functional Python attack script. | https://github.com/ninjazan420/CVE-2025-52691-PoC-SmarterMail-authentication-bypass-exploit-WT-2026-0001 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet