Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-26056 PoC — Infinxt iEdge 100 安全漏洞

Source
Associated Vulnerability
Title:Infinxt iEdge 100 安全漏洞 (CVE-2025-26056)
Description:Infinxt iEdge 100是Infinxt公司的一款适用于中小型分支机构的下一代安全 SD-WAN 设备。 Infinxt iEdge 100 2.1.32版本存在安全漏洞,该漏洞源于Troubleshoot模块MTR功能中对mtrIp参数的用户输入验证不当,可能导致执行任意操作系统命令。
Readme
# CVE-2025-26056

# Auhtor: Rohan Deshpande

# OS Command Injection

# Summary 
OS command injection is a security vulnerability that allows an 
attacker to execute arbitrary commands on a host operating system 
via a vulnerable application. This can lead to unauthorized access, 
data breaches, and system compromise.

# Impact 
The impact of OS command injection can include unauthorized 
access to system resources, data theft, system compromise, and 
potential full control over the affected server, leading to severe 
security breaches and operational disruptions.

# Affected URL 
http://<ip>:<port>/generateMTRReport

# Recommendation 
To mitigate OS command injection vulnerabilities, validate and 
sanitize all user inputs, use parameterized commands or APIs, and 
implement least privilege principles to limit the execution context of 
applications. Regular security testing and code reviews are also 
essential to identify and remediate potential weaknesses. 

# Proof of Concept
1. Login to the console and navigate to Troubleshoot → MTR.
2. Enter IP and capture the request in burp.
3. Try to fetch ‘/etc/passwd’ file through parameter mtrIP and notice file displayed
in HTTP response.
File Snapshot

[4.0K] /data/pocs/38a142cb1d80288f739d0bd76e12a3fe81645240 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.