关联漏洞
描述
Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses official FMC API to check version, supports single/multi-target scanning, and includes a harmless local PoC marker.
介绍
# cve2025-20265
Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses official FMC API to check version, supports single/multi-target scanning, and includes a harmless local PoC marker.
# Cisco FMC CVE-2025-20265 Vulnerability Checker (Safe)
**What it does:**
- Uses the official FMC REST API to query version information
- Compares against known affected versions
- Optional `--poc` mode prints a **harmless local proof-of-concept marker** when a vulnerable version is detected (nothing is sent to the target)
- Supports **single target** or **multiple targets** from a file
- Colorized output for easy reading
> ⚠️ **No exploit code** — this tool does not attempt to exploit anything or run commands on the target.
---
## Features
- ✅ Single or multi-target scanning
- ✅ Safe — read-only API calls
- ✅ Color-coded results
- ✅ Harmless local PoC marker option
- ✅ TLS verification control for self-signed certs
---
## Requirements
- Python 3.8+
- `requests` (`pip install requests`)
- Optional: `colorama` (`pip install colorama`) for better Windows color support
---
## Usage
## Multiple targets from file
targets.txt:
https://fmc1.example.com
https://fmc2.example.com
---
Run:
python fmc_cve2025_20265_checker.py \
--file targets.txt \
--user admin \
--password 'YOURPASS'
### Single target
```bash
python fmc_cve2025_20265_checker.py \
--single https://fmc.example.com \
--user admin \
--password 'YOURPASS'
Optional flags
• --insecure → Skip TLS verification (self-signed certs)
• --no-color → Disable color output
• --poc → Show harmless local PoC marker if target is vulnerable
文件快照
[4.0K] /data/pocs/b725667e931ac93d2b334b98f0b255e461518429
├── [6.4K] fmc_cve2025_20265_checker.py
├── [1.0K] LICENSE
└── [1.7K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。