POC详情: f0f80e892480a68220092ed0bf88502373de1b77

来源
关联漏洞
标题: WatchGuard Fireware OS 安全漏洞 (CVE-2025-9242)
描述:WatchGuard Fireware OS是美国WatchGuard公司的一个在 Firebox 上运行的软件。 WatchGuard Fireware OS 11.10.2版本至11.12.4_Update1版本、12.0版本至12.11.3版本和2025.1版本存在安全漏洞,该漏洞源于越界写入,可能导致远程未经验证的攻击者执行任意代码。
介绍
# Out-of-bounds Write Vulnerability in WatchGuard Fireware OS for VPN Solutions (CVE-2025-9242)

## Overview

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS affecting Mobile User VPN with IKEv2 and Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.

## Details

- **CVE ID**: [CVE-2025-9242](https://nvd.nist.gov/vuln/detail/CVE-2025-9242)
- **Discovered**: 2025-09-17
- **Published**: 2025-10-17
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.

## Vulnerability Description

A remote unauthenticated attacker can potentially execute arbitrary code, compromising the entire firewall system. The vulnerability has a critical severity with a CVSS score of 9.3, indicating maximum impact on confidentiality, integrity, and availability.

## Affected Versions

**Fireware OS:**

- 11.10.2 up to 11.12.4_Update1,
- 12.0 up to 12.11.3, 
- 2025.1
  

## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```

## Contact

For inquiries, please contact **pulse@hazexploit.in**

## Exploit:
### [Download here](https://tinyurl.com/2tawn3cf)


![image](https://github.com/pulsecipher/CVE-2025-9242/blob/main/image.png)


文件快照

[4.0K] /data/pocs/f0f80e892480a68220092ed0bf88502373de1b77 ├── [121K] image.png └── [1.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。