PoC Week 2025-01-27
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2025-21298
- Severity: 9.8 CRITICAL
- Impacted Products: Windows - various, see advisory
- Description: Windows OLE Remote Code Execution Vulnerability
- Remediation: Follow developer guidance.
- More Info: CVE-2025-21298
- PoC: https://github.com/ynwarcs/CVE-2025-21298/
CVE-2024-50603
- Severity: 8.2 HIGH
- Impacted Products: Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996.
- Description: Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-50603
- PoC: https://github.com/th3gokul/CVE-2024-50603
CVE-2024-55591
- Severity: 9.8 CRITICAL
- Impacted Products: FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12
- Description: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
- Remediation: Follow developer guidance.
- More Info: CVE-2024-55591
- PoC: https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591/ (Not a PoC, just a script to check if your instance is vulnerable, but I think it’s valuable and useful as the vuln is critical)
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.