# OctoPrint 文件上传RCE漏洞
N/A
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | In OctoPrint version <=1.11.2, an attacker with file upload access (e.g., valid API key or session) can craft a malicious filename that bypasses sanitization and is later executed by OctoPrint’s event system, leading to remote code execution (RCE) on the host | https://github.com/prabhatverma47/CVE-2025-58180 | POC详情 |
标题: RCE in OctoPrint via Unsanitized Filename in File Upload · Advisory · OctoPrint/OctoPrint · GitHub -- 🔗来源链接
标签: x_refsource_CONFIRM
神龙速读标题: fix: escape parameters in system event handlers · OctoPrint/OctoPrint@be4201e · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: fix: strip some more characters from sanitized file names · OctoPrint/OctoPrint@c3a9409 · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读暂无评论