Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-5777
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread
Source: NVD (National Vulnerability Database)
Vulnerability Description
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存读
Source: NVD (National Vulnerability Database)
Vulnerability Title
Citrix NetScaler ADC和Citrix NetScaler Gateway 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Citrix NetScaler ADC和Citrix NetScaler Gateway都是美国Citrix公司的产品。Citrix NetScaler ADC是一个应用程序交付和安全性平台。Citrix NetScaler Gateway是一种安全远程访问的解决方案。 Citrix NetScaler ADC和Citrix NetScaler Gateway存在安全漏洞,该漏洞源于NetScaler Management Interface输入验证不足,可能导致内存过度读取。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
NetScalerADC 14.1 ~ 43.56 -
NetScalerGateway 14.1 ~ 43.56 -
II. Public POCs for CVE-2025-5777
#POC DescriptionSource LinkShenlong Link
1Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5777.yamlPOC Details
2详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-POC Details
3CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for NetScaler ADC/Gateway “memory bleed”https://github.com/RickGeex/CVE-2025-5777-CitrixBleedPOC Details
4CitrixBleed2 pochttps://github.com/idobarel/CVE-2025-5777POC Details
5Memory disclosure vulnerability in Citrix NetScaler ADC and Gateway when configured as a Gateway (VPN virtual server, ICA proxy, CVPN, RDP Proxy).https://github.com/nocerainfosec/cve-2025-5777POC Details
6Citrix Bleed 2 PoC Scanner (CVE-2025-5777)https://github.com/RaR1991/citrix_bleed_2POC Details
7CitrixBleed-2 Checker & Poc automatic exploit and check token.https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777POC Details
8CitrixBleed 2 (CVE-2025-5777)https://github.com/Chocapikk/CVE-2025-5777POC Details
9CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway deviceshttps://github.com/win3zz/CVE-2025-5777POC Details
10CitrixBleed2 powershell versionhttps://github.com/FrenzisRed/CVE-2025-5777POC Details
11CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)https://github.com/bughuntar/CVE-2025-5777POC Details
12Citrix NetScaler Memory Leak PoChttps://github.com/0xgh057r3c0n/CVE-2025-5777POC Details
13CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway]https://github.com/SleepNotF0und/CVE-2025-5777POC Details
14An advanced, powerful, and easy-to-use tool designed to detect and exploit CVE-2025-5777 (CitrixBleed 2). This script not only identifies the vulnerability but also helps in demonstrating its impact by parsing human-readable information from the memory leak.https://github.com/cyberleelawat/ExploitVeerPOC Details
15CVE-2025-5777https://github.com/B1ack4sh/Blackash-CVE-2025-5777POC Details
16PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Centralhttps://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCEPOC Details
17Nonehttps://github.com/rob0tstxt/POC-CVE-2025-5777POC Details
18CitrixBleed 2 NetScaler honeypot logshttps://github.com/below0day/Honeypot-Logs-CVE-2025-5777POC Details
19Nonehttps://github.com/soltanali0/CVE-2025-5777-ExploitPOC Details
20Update the old POC of CVE-2025-5777 Citrix NetScaler Memory leakhttps://github.com/rootxsushant/Citrix-NetScaler-Memory-Leak-CVE-2025-5777POC Details
21Exploit for CVE-2025-5777: Citrix NetScaler Memory Disclosure (CitrixBleed 2)https://github.com/ndr-repo/CVE-2025-5777POC Details
22🛠️ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data.https://github.com/Lakiya673/CVE-2025-5777POC Details
23Citrix NetScaler Memory Leak PoChttps://github.com/zr1p3r/CVE-2025-5777POC Details
24placeholder for CitrixBleed 2.0 CVE-2025-5777https://github.com/mr-r3b00t/CVE-2025-5777POC Details
25Nonehttps://github.com/rashedhasan090/CVE-2025-5777POC Details
26CVE-2025-5777https://github.com/Ashwesker/Blackash-CVE-2025-5777POC Details
27CVE-2025-5777https://github.com/Ashwesker/Ashwesker-CVE-2025-5777POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-5777
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-5777

No comments yet


Leave a comment