Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-0282 PoC — Ivanti多款产品 安全漏洞

Source
Associated Vulnerability
Title:Ivanti多款产品 安全漏洞 (CVE-2025-0282)
Description:Ivanti Connect Secure(ICS)等都是美国Ivanti公司的产品。Ivanti Connect Secure是一款安全远程网络连接工具。Ivanti Policy Secure(IPS)是一个网络访问控制 (NAC) 解决方案。Ivanti Neurons是一款开创性的平台,能简化和自动化IT系统。 Ivanti多款产品存在安全漏洞,该漏洞源于存在基于堆栈的缓冲区溢出问题。攻击者利用该漏洞可以远程执行代码。以下产品及版本受到影响:Ivanti Connect Secure 22.7R2
Description
CVE-2025-0282
Readme
# Blackash-CVE-2025-0282

# Description

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

# Metrics

CNA:  `ivanti` Base Score: 9.0 CRITICAL ⚫ Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

# Uploading a Web Shell

To use the tool for uploading a web shell to the target system:

```
python3 CVE_2025_0282.py <target_ip> <local_shell_path>
```
+ <target_ip>: The IP address of the target server.
+ <local_shell_path>: Path to the web shell file on your local machine.
File Snapshot

[4.0K] /data/pocs/a561e1aa94aa0378d7ed3ceb43915c5e7a8efc18 ├── [5.3K] CVE-2025-0282.py ├── [ 690] README.md └── [ 206] shell.php 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.