POC详情: f916929414b18d8fa5cfb65fd37deda2d670c7d9

来源
关联漏洞
标题: XORUX LPAR2RRD 安全漏洞 (CVE-2025-54769)
描述:XORUX LPAR2RRD是捷克XORUX公司的一个服务器性能监控平台。 XORUX LPAR2RRD存在安全漏洞,该漏洞源于目录遍历和文件上传功能结合,可能导致远程代码执行。
描述
A C‑based proof‑of‑concept exploit for CVE‑2025‑54769, automating the creation and upload of a malicious Perl CGI script to LPAR2RRD’s upgrade endpoint, leveraging directory traversal for remote code execution.
介绍
# CVE-2025-54769 – LPAR2RRD (RCE)

## Description : 
 

This repository contains a Proof‑of‑Concept (PoC) exploit for CVE-2025-54769, a vulnerability found in lpar2rrd.


The vulnerability allows remote code execution (RCE) and directory traversal by abusing the /lpar2rrd-cgi/upgrade.sh endpoint. The exploit workflow is as follows:


- Script Generation : 


Automatically creates a malicious Perl CGI payload (users.pl) that executes arbitrary shell commands (default: whoami).


- Payload Upload :


Uses libcurl to POST the generated script as an “upgrade package” to the vulnerable endpoint, bypassing basic file validation.


- Directory Traversal : 


Exploits a path traversal flaw to move the uploaded script into the CGI directory, making it accessible for execution.


- Command Execution & Retrieval:


Triggers the CGI script via a crafted GET request (/lpar2rrd-cgi/users.sh?cmd=commandLinux) and captures the command output for the attacker.


## Usage :

```
gcc exploit.c argparse.c -o exploit -lcurl
./exploit -i <IP> -p PORT -t <PROTOCOL>
```
- Verbose Mode :
```
./exploit -i <IP> -p <PORT> -t <PROTOCOL> -v 
``` 

Replace with the target LPAR2RRD instance. The target port should match the service (e.g., 80 for HTTP, 443 for HTTPS), and the protocol should be either http or https

## References :


- NVD Entry: https://nvd.nist.gov/vuln/detail/CVE-2025-54769  


- CVE : https://www.cve.org/CVERecord?id=CVE-2025-54769

## License :


MIT License
文件快照

[4.0K] /data/pocs/f916929414b18d8fa5cfb65fd37deda2d670c7d9 ├── [ 19K] exploit.c ├── [1.0K] LICENSE └── [1.5K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。