Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-46271 PoC — PLANET UNI-NMS-Lite 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:PLANET UNI-NMS-Lite 操作系统命令注入漏洞 (CVE-2025-46271)
Description:PLANET UNI-NMS-Lite是中国PLANET公司的一个通用网络管理系统,可监控所有已部署的有线或无线 PoE 工业级网络设备。 PLANET UNI-NMS-Lite存在操作系统命令注入漏洞,该漏洞源于命令注入,可能导致读取或操纵设备数据。
Readme
# CVE-2025-46271-Reverse-Shell-PoC

<h1>Disclaimer</h1>
This repository is for educational purposes only. The information provided here is intended to help developers understand the vulnerability and protect their systems. Do not use this exploit maliciously or without permission. Use of this PoC is at your own risk. The author is not responsible for any damages or legal issues that may arise from the use of this information.
File Snapshot

[4.0K] /data/pocs/d335e48696054a2b8d39f297114181844453c335 ├── [ 34K] LICENSE ├── [3.2K] PoC.py └── [ 430] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.