Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-20265 PoC — Cisco Secure Firewall Management Center 注入漏洞

Source
Associated Vulnerability
Title:Cisco Secure Firewall Management Center 注入漏洞 (CVE-2025-20265)
Description:Cisco Secure Firewall Management Center是美国思科(Cisco)公司的一个强大的网络安全管理工具。 Cisco Secure Firewall Management Center存在注入漏洞,该漏洞源于RADIUS认证阶段输入处理不当,可能导致执行任意命令。
Description
PoC for CVE-2025-20265 Cisco Secure FMC Software RADIUS Remote Code Execution Vulnerability
Readme
# PoC for CVE-2025-20265

- [Advisory](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79)

## ⚠️ WARNING

This is a functional exploit for a 1-day vulnerability.

- **It can execute code on vulnerable systems.**
- **Use only on your own internal servers you are authorized to test.**
- **Unauthorized use is illegal and unethical.**

**Use at your own risk. You are responsible for your actions.**

## Building

1. [Install Rust](https://www.rust-lang.org/tools/install)
2. Build the PoC:

```sh
cargo build --release
```

## Usage

```sh
$ ./target/release/cve_2025_20265 --help
# or
$ cargo run --release -- --help
```

To debug, use the environment variable `RUST_LOG`:

```sh
RUST_LOG=debug cargo run --release -- --help
```

## Examples

```sh
# use either the build or the path to the executable file
$ alias EXE="cargo run --release"
# or
$ cargo build --release
$ alias EXE="./target/release/cve_2025_20265"

# check the target
$ EXE https://10.10.10.1:4443/

# read targets from the file
$ echo -e "https://10.10.10.1:4443\nhttp://127.0.0.1\nhttp://10.10.10.10" > targets.txt
$ EXE --from-file targets.txt
```
File Snapshot

[4.0K] /data/pocs/6d399e38176bdd628ee5b97308f9986e24f45194 ├── [ 77K] Cargo.lock ├── [ 467] Cargo.toml ├── [1.2K] README.md └── [4.0K] src └── [ 13K] main.rs 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.