关联漏洞
描述
This is an improved version of the CVE-2025-49132 proof of concept exploit.
介绍
# CVE-2025-49132 PoC (Improved)
This is an improved version of the CVE-2025-49132 proof of concept exploit.
## CVE Information
- **CVE ID**: CVE-2025-49132
- **NVD Reference**: [https://nvd.nist.gov/vuln/detail/cve-2025-49132](https://nvd.nist.gov/vuln/detail/cve-2025-49132)
- **Wiz Database**: [https://www.wiz.io/vulnerability-database/cve/cve-2025-49132](https://www.wiz.io/vulnerability-database/cve/cve-2025-49132)
## Original Work
This improvement is based on the original PoC from [0xtensho/CVE-2025-49132-poc](https://github.com/0xtensho/CVE-2025-49132-poc/tree/main).
## Improvements
- **Code Quality**: Refactored to follow Python Black and PEP8 standards
- **Better HTTP Client**: Replaced `os.system()` with `requests` library for more reliable HTTP requests
- **Descriptive Variables**: Renamed variables for better code readability
- **CLI Interface**: Added proper command-line argument parsing with help messages
- **Error Handling**: Improved error handling and user feedback
## Usage
```bash
python poc.py --host <target_host> --command <command_to_execute>
```
### Examples
```bash
# Execute 'whoami' command
python poc.py --host 192.168.1.100 --command "whoami"
# Execute 'id' command
python poc.py --host example.com --command "id"
```
### Options
- `--host`, `-H`: Target host (required)
- `--command`, `-c`: Command to execute on target (required)
- `--help`, `-h`: Show help message
## Requirements
```
requests>=2.25.0
```
Install with:
```bash
pip install requests
```
## Disclaimer
This tool is for educational and authorized penetration testing purposes only. Only use on systems you own or have explicit permission to test.# CVE-2025-49132_poc
文件快照
[4.0K] /data/pocs/7077b6822a8c2909fdb5de713a09adbafd6acdea
├── [2.8K] poc.py
└── [1.7K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。