mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
1.7 KiB
1.7 KiB
CVE-2025-54309
Description
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
POC
Reference
- https://www.vicarius.io/vsociety/posts/cve-2025-54309-detect-crushftp-vulnerability
- https://www.vicarius.io/vsociety/posts/cve-2025-54309-mitigate-crushftp-vulnerability
Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/DevGreick/devgreick
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/a1batr0ssG/VulhubExpand
- https://github.com/blueisbeautiful/CVE-2025-54309
- https://github.com/brokendreamsclub/CVE-2025-54309
- https://github.com/chin-tech/CrushFTP_CVE-2025-54309
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/foregenix/CVE-2025-54309
- https://github.com/issamjr/CVE-2025-54309-EXPLOIT
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/packetinside/CISA_BOT
- https://github.com/ums91/CISA_BOT
- https://github.com/watchtowrlabs/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309
- https://github.com/whisperer1290/CVE-2025-54309__Enhanced_exploit
- https://github.com/zzyss-marker/actions