关联漏洞
描述
This is a minimal, educational simulation that demonstrates the _impact_ class of a management-plane parsing RCE (inspired by CVE-2025-20265). It intentionally executes commands from crafted input for local learning only.
介绍
# Day08 — Cisco FMC-style Management RCE (Simulation)
This is a minimal, educational simulation that demonstrates the _impact_ class of a management-plane parsing RCE (inspired by CVE-2025-20265). It intentionally executes commands from crafted input for local learning only.
## Quickstart
```bash
chmod +x entrypoint.sh exploit.sh
docker build -t fmc-sim .
docker run --rm -d -p 8444:8444 --name fmc-sim fmc-sim
```
文件快照
[4.0K] /data/pocs/ac6f5e8ba32e4c374f9515e9b8e87aac91b82010
├── [ 224] DISCLAIMER.md
├── [ 435] Dockerfile
├── [ 231] entrypoint.sh
├── [ 313] exploit.sh
├── [ 422] README.md
└── [2.4K] server.py
0 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。