PoC Week 2025-04-28
The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count. Older CVEs, trivially exploitable vulnerabilities (such as using hard-coded credentials) and those affecting open source projects with very small userbases aren’t listed.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them.
CVE-2025-32433
- Severity: 10 CRITICAL
- Impacted Products: OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20
- Description: Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-32433
- PoC: https://github.com/tobiasGuta/Erlang-OTP-CVE-2025-32433/
CVE-2025-3248
- Severity: 9.8 CRITICAL
- Impacted Products: Langflow versions prior to 1.3.0
- Description: Code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-3248
- PoC: https://github.com/minxxcozy/CVE-2025-3248-langflow-RCE/
CVE-2025-28238
- Severity: Awaiting analysis
- Impacted Products: Elber REBLE310 Firmware v5.5.1.R , Equipment Model: REBLE310/RX10/4AS
- Description: Improper session management in Elber REBLE310 Firmware v5.5.1.R , Equipment Model: REBLE310/RX10/4ASI allows attackers to execute a session hijacking attack.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-28238
- PoC: https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28238
CVE-2025-29047
- Severity: Awaiting analysis
- Impacted Products: ALFA WiFi CampPro router ALFA_CAMPRO-co-2.29
- Description: Buffer Overflow vulnerability inALFA WiFi CampPro router ALFA_CAMPRO-co-2.29 allows a remote attacker to execute arbitrary code via the hiddenIndex in the function StorageEditUser
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-29047
- PoC: https://github.com/xyqer1/ALFA-WiFi-CampPro-StorageEditUser-hiddenIndex/
CVE-2025-29042
- Severity: Awaiting analysis
- Impacted Products: D-LINK DIR 832x 240802
- Description: A remote attacker can execute arbitrary code via the macaddr key value to the function 0x42232c.
- Remediation: Follow developer advice.
- More Info: NVD - CVE-2025-29042
- PoC: https://github.com/xyqer1/Dlink-dir-823x-set_prohibiting-macaddr-CommandInjection/
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.