Skip to content

GRodolphe/CVE-2025-49132_poc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

CVE-2025-49132 PoC (Improved)

This is an improved version of the CVE-2025-49132 proof of concept exploit.

CVE Information

Original Work

This improvement is based on the original PoC from 0xtensho/CVE-2025-49132-poc.

Improvements

  • Code Quality: Refactored to follow Python Black and PEP8 standards
  • Better HTTP Client: Replaced os.system() with requests library for more reliable HTTP requests
  • Descriptive Variables: Renamed variables for better code readability
  • CLI Interface: Added proper command-line argument parsing with help messages
  • Error Handling: Improved error handling and user feedback

Usage

python poc.py --host <target_host> --command <command_to_execute>

Examples

# Execute 'whoami' command
python poc.py --host 192.168.1.100 --command "whoami"

# Execute 'id' command
python poc.py --host example.com --command "id"

Options

  • --host, -H: Target host (required)
  • --command, -c: Command to execute on target (required)
  • --help, -h: Show help message

Requirements

requests>=2.25.0

Install with:

pip install requests

Disclaimer

This tool is for educational and authorized penetration testing purposes only. Only use on systems you own or have explicit permission to test.# CVE-2025-49132_poc

About

This is an improved version of the CVE-2025-49132 proof of concept exploit.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages