PoC Week 2025-01-20
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2024-55591
- Severity: 9.8 CRITICAL
- Impacted Products: FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12
- Description: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-55591
- PoC: https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591/ (Not a PoC, just a script to check if your instance is vulnerable, but I think it’s valuable and useful as the vuln is critical)
CVE-2025-0282
- Severity: 9.0 CRITICAL
- Impacted Products: Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3
- Description: A stack-based buffer overflow allows a remote unauthenticated attacker to achieve remote code execution.
- Remediation: Follow developer guidance.
- More Info: CVE-2025-0282
- PoC: https://github.com/sfewer-r7/CVE-2025-0282/
CVE-2024-57223 & CVE-2024-57224
- Severity: Awaiting analysis
- Impacted Products: Linksys E7350 1.1.00.032
- Description: Command injections.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-57223 & CVE-2024-57224
- PoC: https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_6_apcli_wps_gen_pincode/README.md & https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_3_apcli_do_enr_pin_wps/README.md
CVE-2024-50603
- Severity: 8.2 HIGH
- Impacted Products: Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996.
- Description: Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-50603
- PoC: https://github.com/th3gokul/CVE-2024-50603
CVE-2024-49113
- Severity: 7.5 HIGH
- Impacted Products: LDAP - see advisory
- Description: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
- Remediation: Follow developer guidance.
- More Info: CVE-2024-49113
- PoC: https://github.com/Sachinart/CVE-2024-49113-Checker/
CVE-2024-12847
- Severity: 7.5 HIGH
- Impacted Products: NETGEAR DGN1000 before 1.1.00.48
- Description: Authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been exploited in the wild since at least 2017.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-12847
- PoC: https://www.exploit-db.com/exploits/43055
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.