关联漏洞
Description
EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766
介绍
EDNS Client Subnet (ECS) Remote Detection Tool - CVE-2025-40766
This tool checks whether a remote DNS resolver supports **EDNS Client Subnet (ECS)** — a DNS extension that may expose systems to cache poisoning or information leakage vulnerabilities such as **CVE-2025-40766**.
## 🔍 What It Does
- Sends a DNS query with an ECS option
- Detects whether ECS is enabled on the target DNS resolver
- Compatible with both Linux/macOS (Python) and Windows (PowerShell)
## 💻 Usage (Python)
### Install dependencies:
```bash
pip3 install -r requirements.txt
```
### Run the script:
```bash
python3 ecs_checker.py <DNS_SERVER_IP>
```
### Examples:
```bash
python3 ecs_checker.py 1.1.1.1
[-] 1.1.1.1 does NOT support ECS (CLIENT-SUBNET not found).
python3 ecs_checker.py 8.8.8.8
[+] 8.8.8.8 supports ECS (CLIENT-SUBNET found).
```
文件快照
[4.0K] /data/pocs/992a2b534508bafa7727dcd32674aa8886d8a17e
├── [ 850] ecs_checker.py
├── [ 837] README.md
└── [ 17] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。