关联漏洞
            
        
        
            介绍
            # Exploit CVE-2025-31161
##  INSTALLATION
1.
```
git clone https://github.com/cesarbtakeda/CVE-2025-31161.git && cd CVE-2025-31161
```
2. Modo De uso
```
sudo exploit2.py [-h] [-u HOST] [-p PORT] [-tu TARGET_USER] [-nu NEW_USER] [-np PASSWORD]
```
ou
1. Depende da biblioteca lcurl
```
git clone https://github.com/cesarbtakeda/CVE-2025-31161.git && cd CVE-2025-31161 && gcc -o exploit exploit.c -lcurl && ./exploit -h
```
2. Modo De uso
```
sudo ./exploit [-h] [-u HOST] [-p PORT] [-t TARGET_USER] [-n NEW_USER] [-s PASSWORD]
```
## MAIN FEATURES
### 🌐 Features
- Python
### POC (Prove Of Concept)
<img width="1911" height="1033" alt="image" src="https://github.com/user-attachments/assets/7015be81-4dd9-4a17-b773-44cc64a993d5" />
### 🔐 LEGAL NOTICE
USE PERMITTED ONLY IN:
- Authorized Pentests
- Security Labs
- Academic Research
- Testing on Authorized Vms!
  
### ⚠️ PROHIBITED:
- Unauthorized access
- Illegal data collection
## 📜 License(LICENSE)
[](https://github.com/cesarbtakeda/CVE-2025-31161/blob/main/LICENSE)
##  Reports 📱
[](https://github.com/cesarbtakeda/CVE-2025-31161/issues)  
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/d5d35804de6150d0d8784a3271374f90fc634c43
├── [7.5K]  exploit.c
├── [3.2K]  exploit.py
├── [1.0K]  LICENSE
└── [1.2K]  README.md
0 directories, 4 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。