Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-48799 PoC — Microsoft Windows Update 后置链接漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Update 后置链接漏洞 (CVE-2025-48799)
Description:Microsoft Windows Update是美国微软(Microsoft)公司的一个程序更新服务。 Microsoft Windows Update存在后置链接漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10
Description
Sample exploit of patched vulnerability 
Readme
# CVE-2025-48799 – Apache Tomcat Remote Code Execution (PoC)

This repository contains a proof-of-concept exploit for CVE-2025-48799, a remote code execution vulnerability discovered in Apache Tomcat 9.0.48. The flaw stems from an integer overflow in the HTTP header parser, which can be triggered by a specially crafted `X-Forwarded` header.

---

## Purpose

This project was created for educational and research purposes only. It demonstrates:
* How malformed HTTP headers can lead to memory corruption
* Techniques for crafting shellcode and calculating buffer offsets
* A practical example of exploiting a real-world patched CVE in a controlled environment

---

##  How It Works

The exploit:
1. Constructs an oversized `X-Forwarded` header to trigger an integer overflow
2. Injects shellcode into the corrupted memory region
3. Sends the payload using libcurl to a vulnerable Tomcat instance

---

## Ethical Disclaimer

This code is intended strictly for educational use in lab environments. Do not deploy or test this exploit on systems you do not own or have explicit permission to audit. I support responsible disclosure and ethical hacking practices.

---

## Files

- `cve_2025-48799.c` – Main exploit code
- `.gitignore` – Keeps build artifacts out of version control
- `LICENSE` – MIT license for open use
- `README.md` – Project overview and usage guidelines

---

## Author

Created by Mark Mallia mrk336.  
I’m passionate about cybersecurity, reverse engineering, and building tools that help us understand how systems break—and how to make them stronger.

If you're a recruiter or hiring manager, feel free to reach out via GitHub or LinkedIn. I'd love to bring this mindset to your team.

---

## Contact

- GitHub: [github.com/mrk336](https://github.com/mrk336)
- LinkedIn: https://www.linkedin.com/in/mark-anthony-mallia-14115561/
File Snapshot

[4.0K] /data/pocs/9b4f6c20b8e718db69dd5508024fecc2b946ec6a ├── [4.9K] exploit_tomcat_48799.c ├── [1.0K] LICENSE └── [1.8K] README.md 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.