POC详情: 6d399e38176bdd628ee5b97308f9986e24f45194

来源
关联漏洞
标题: Cisco Secure Firewall Management Center 注入漏洞 (CVE-2025-20265)
描述:Cisco Secure Firewall Management Center是美国思科(Cisco)公司的一个强大的网络安全管理工具。 Cisco Secure Firewall Management Center存在注入漏洞,该漏洞源于RADIUS认证阶段输入处理不当,可能导致执行任意命令。
描述
PoC for CVE-2025-20265 Cisco Secure FMC Software RADIUS Remote Code Execution Vulnerability
介绍
# PoC for CVE-2025-20265

- [Advisory](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79)

## ⚠️ WARNING

This is a functional exploit for a 1-day vulnerability.

- **It can execute code on vulnerable systems.**
- **Use only on your own internal servers you are authorized to test.**
- **Unauthorized use is illegal and unethical.**

**Use at your own risk. You are responsible for your actions.**

## Building

1. [Install Rust](https://www.rust-lang.org/tools/install)
2. Build the PoC:

```sh
cargo build --release
```

## Usage

```sh
$ ./target/release/cve_2025_20265 --help
# or
$ cargo run --release -- --help
```

To debug, use the environment variable `RUST_LOG`:

```sh
RUST_LOG=debug cargo run --release -- --help
```

## Examples

```sh
# use either the build or the path to the executable file
$ alias EXE="cargo run --release"
# or
$ cargo build --release
$ alias EXE="./target/release/cve_2025_20265"

# check the target
$ EXE https://10.10.10.1:4443/

# read targets from the file
$ echo -e "https://10.10.10.1:4443\nhttp://127.0.0.1\nhttp://10.10.10.10" > targets.txt
$ EXE --from-file targets.txt
```
文件快照

[4.0K] /data/pocs/6d399e38176bdd628ee5b97308f9986e24f45194 ├── [ 77K] Cargo.lock ├── [ 467] Cargo.toml ├── [1.2K] README.md └── [4.0K] src └── [ 13K] main.rs 1 directory, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。