Detection for CVE-2025-52914# CVE-2025-52914
## How does this detection method work?
Versions are extracted from target hosts, specifically the `SVR_VER` html response in the body, and then matches on versions prior to 9.3.1 and versions from 10.0.26 to 10.1.101 (inclusive).
## How do I run this script?
1. Download Nuclei from [here](https://github.com/projectdiscovery/nuclei)
2. Copy the template to your local system
3. Run the following command: `nuclei -u https://yourHost.com -t template.yaml`
## References
- https://nvd.nist.gov/vuln/detail/CVE-2025-52914
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0008
## Disclaimer
Use at your own risk, I will not be responsible for illegal activities you conduct on infrastructure you do not own or have permission to scan.
## Contact
Feel free to reach out to me on [Signal](https://signal.me/#eu/0Qd68U1ivXNdWCF4hf70UYFo7tB0w-GQqFpYcyV6-yr4exn2SclB6bFeP7wTAxQw) if you have any questions.
[4.0K] /data/pocs/2f148b0c95efdf77129cf12e1999488d0b50270e
├── [ 974] README.md
└── [1.1K] template.yaml
0 directories, 2 files