Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-1718 PoC — Hitachi Relion 安全漏洞

Source
Associated Vulnerability
Title:Hitachi Relion 安全漏洞 (CVE-2025-1718)
Description:Hitachi Relion是日本日立制作所(Hitachi)公司的用于保护,控制,测量和监视为电力系统。 Hitachi Relion存在安全漏洞,该漏洞源于磁盘空间管理不当,可能导致设备重启。以下型号受到影响:670、650和SAM600-IO。
Description
CVE-2025-1718 - Hitachi Energy FTP Reboot Vulnerability Scanner
Readme

# 🚨 CVE-2025-1718 Scanner - FTP Reboot Vulnerability in Hitachi Energy Devices

![CVE](https://img.shields.io/badge/CVE-2025--1718-red) ![Python](https://img.shields.io/badge/Language-Python-blue) ![Status](https://img.shields.io/badge/Status-Active-green)

## 📌 Description

**CVE-2025-1718** is a high-severity vulnerability in **Hitachi Energy Relion 670/650** and **SAM600-IO** products. A local authenticated user with FTP access can **cause the device to reboot** unexpectedly by **exhausting disk space**, leading to **denial of service (DoS)**.

- **Attack Vector:** Network (FTP)
- **Privileges Required:** Low (Authenticated FTP access)
- **Impact:** System reboot (DoS)
- **CVSS Score:** 7.1 (High)

---

## 🛠️ Features

- ✅ FTP authentication and connection
- ✅ Disk space check trigger
- ✅ Log output with color and effects
- ✅ Safe threading & timeout
- ✅ Custom banner

---

## 🚀 Installation

```bash
git clone https://github.com/issamjr/CVE-2025-1718-Scanner.git
cd CVE-2025-1718-Scanner
pip install -r requirements.txt
```

---

## ⚙️ Usage

```bash
python3 scanner.py --host <TARGET_IP> --port 21 --user <FTP_USER> --pass <FTP_PASS>
```

Example:

```bash
python3 scanner.py --host 192.168.1.100 --port 21 --user test --pass test123
```

---

## ⚠️ Disclaimer

This tool is for educational and authorized testing purposes only. Misuse may violate laws and result in criminal charges.

---

## 👨‍💻 Developed by [issamjr](https://github.com/issamjr)
File Snapshot

[4.0K] /data/pocs/3db464ab4f25962be1ac009850181f6baa10d12f ├── [1.5K] README.md ├── [ 9] requirements.txt ├── [2.5K] scanner.py └── [ 12] trigger.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.