# Exploit CVE-2025-31161
## INSTALLATION
1.
```
git clone https://github.com/cesarbtakeda/CVE-2025-31161.git && cd CVE-2025-31161
```
2. Modo De uso
```
sudo exploit2.py [-h] [-u HOST] [-p PORT] [-tu TARGET_USER] [-nu NEW_USER] [-np PASSWORD]
```
ou
1. Depende da biblioteca lcurl
```
git clone https://github.com/cesarbtakeda/CVE-2025-31161.git && cd CVE-2025-31161 && gcc -o exploit exploit.c -lcurl && ./exploit -h
```
2. Modo De uso
```
sudo ./exploit [-h] [-u HOST] [-p PORT] [-t TARGET_USER] [-n NEW_USER] [-s PASSWORD]
```
## MAIN FEATURES
### 🌐 Features
- Python
### POC (Prove Of Concept)
<img width="1911" height="1033" alt="image" src="https://github.com/user-attachments/assets/7015be81-4dd9-4a17-b773-44cc64a993d5" />
### 🔐 LEGAL NOTICE
USE PERMITTED ONLY IN:
- Authorized Pentests
- Security Labs
- Academic Research
- Testing on Authorized Vms!
### ⚠️ PROHIBITED:
- Unauthorized access
- Illegal data collection
## 📜 License(LICENSE)
[](https://github.com/cesarbtakeda/CVE-2025-31161/blob/main/LICENSE)
## Reports 📱
[](https://github.com/cesarbtakeda/CVE-2025-31161/issues)
[4.0K] /data/pocs/d5d35804de6150d0d8784a3271374f90fc634c43
├── [7.5K] exploit.c
├── [3.2K] exploit.py
├── [1.0K] LICENSE
└── [1.2K] README.md
1 directory, 4 files