尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Detection for CVE-2025-57819 | https://github.com/rxerium/CVE-2025-57819 | POC详情 |
| 2 | This is repository contains a script to check for current IOCs listed in the freepbx forum topic of the CVE-2025-57819 | https://github.com/Sucuri-Labs/CVE-2025-57819-ioc-check | POC详情 |
| 3 | FreePBX SQL Injection Exploit | https://github.com/blueisbeautiful/CVE-2025-57819 | POC详情 |
| 4 | A write up of CVE-2025-57819, a vulnerability affecting FreePBX 15, 16, and 17 | https://github.com/net-hex/CVE-2025-57819 | POC详情 |
| 5 | FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based). | https://github.com/ImBIOS/lab-cve-2025-57819 | POC详情 |
| 6 | CVE-2025-57819 | https://github.com/B1ack4sh/Blackash-CVE-2025-57819 | POC详情 |
| 7 | FreePBX backdoor cleanup script used in 0-day exploitation of CVE-2025-57819 was detected. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/backdoor/freepbx-cleanup-backdoor.yaml | POC详情 |
| 8 | None | https://github.com/watchtowrlabs/watchTowr-vs-FreePBX-CVE-2025-57819 | POC详情 |
| 9 | FreePBX 15, 16, and 17 contain a remote code execution caused by insufficiently sanitized user-supplied data in endpoints, letting unauthenticated attackers manipulate the database and execute code remotely, exploit requires no authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-57819.yaml | POC详情 |
| 10 | FreePBX SQL Injection Exploit | https://github.com/brokendreamsclub/CVE-2025-57819 | POC详情 |
| 11 | FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints. | https://github.com/MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819 | POC详情 |
| 12 | Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting. | https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC | POC详情 |
| 13 | This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create a new admin user (poc_admin.py), and another to extract credentials using sqlmap (poc_auto_get_username_pass.py). For educational and authorized use only. | https://github.com/orange0Mint/CVE-2025-57819_FreePBX | POC详情 |
| 14 | 🔍 Detect SQL injection risks in FreePBX's admin interface safely and efficiently, providing actionable insights and clean JSON reports for security teams. | https://github.com/JakovBis/CVE-2025-57819_FreePBX-PoC | POC详情 |
| 15 | CVE-2025-57819 | https://github.com/Ashwesker/Blackash-CVE-2025-57819 | POC详情 |
| 16 | Detects vulnerable FreePBX versions affected by CVE-2025-57819. | https://github.com/cybertechajju/cve-2025-57819 | POC详情 |
| 17 | CVE-2025-57819 | https://github.com/Ashwesker/Ashwesker-CVE-2025-57819 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论