Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Intermesh | groupoffice | < 6.8.150 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | RCE - Command Injection via TNEF Attachment Handler | https://github.com/NumberOreo1/CVE-2026-25512 | POC Details |
| 2 | None | https://github.com/mbanyamer/CVE-2026-25512-PoC-Group-Office-Authenticated-RCE | POC Details |
| 3 | Group-Office before versions 6.8.150, 25.0.82, and 26.0.5 is vulnerable to remote code execution via OS command injection. The endpoint email/message/tnefAttachmentFromTempFile directly concatenates the user-controlled parameter tmp_file into an exec() call. By injecting shell metacharacters into tmp_file, an authenticated attacker can execute arbitrary system commands on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-25512.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet