PoC Week 2025-02-03

Posted on Feb 3, 2025

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.

CVE-2024-57595

  • Severity: Awaiting analysis
  • Impacted Products: DLINK DIR-825 REVB 2.03 devices
  • Description: OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter “wps_pin” passed to the apc_client_pin.cgi binary through a POST request.
  • Remediation: Follow developer guidance.
  • More Info: CVE-2024-57595
  • PoC: https://github.com/IdaJea/IOT_vuln_1/blob/master/DIR825/wps_pin.md

CVE-2024-55591

  • Severity: 9.8 CRITICAL
  • Impacted Products: FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12
  • Description: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
  • Remediation: Follow developer guidance.
  • More Info: CVE-2024-55591
  • PoC: https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591/ (Not a PoC, just a script to check if your instance is vulnerable, but I think it’s valuable and useful as the vuln is critical)

CVE-2024-55194

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.