关联漏洞
标题:
WatchGuard Fireware OS 安全漏洞
(CVE-2025-9242)
描述:WatchGuard Fireware OS是美国WatchGuard公司的一个在 Firebox 上运行的软件。 WatchGuard Fireware OS 11.10.2版本至11.12.4_Update1版本、12.0版本至12.11.3版本和2025.1版本存在安全漏洞,该漏洞源于越界写入,可能导致远程未经验证的攻击者执行任意代码。
介绍
# Out-of-bounds Write Vulnerability in WatchGuard Fireware OS for VPN Solutions (CVE-2025-9242)
## Overview
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS affecting Mobile User VPN with IKEv2 and Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.
## Details
- **CVE ID**: [CVE-2025-9242](https://nvd.nist.gov/vuln/detail/CVE-2025-9242)
- **Discovered**: 2025-09-17
- **Published**: 2025-10-17
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
## Vulnerability Description
A remote unauthenticated attacker can potentially execute arbitrary code, compromising the entire firewall system. The vulnerability has a critical severity with a CVSS score of 9.3, indicating maximum impact on confidentiality, integrity, and availability.
## Affected Versions
**Fireware OS:**
- 11.10.2 up to 11.12.4_Update1,
- 12.0 up to 12.11.3,
- 2025.1
## Running
To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```
## Contact
For inquiries, please contact **pulse@hazexploit.in**
## Exploit:
### [Download here](https://tinyurl.com/2tawn3cf)

文件快照
[4.0K] /data/pocs/f0f80e892480a68220092ed0bf88502373de1b77
├── [121K] image.png
└── [1.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。