This is an improved version of the CVE-2025-49132 proof of concept exploit.
- CVE ID: CVE-2025-49132
- NVD Reference: https://nvd.nist.gov/vuln/detail/cve-2025-49132
- Wiz Database: https://www.wiz.io/vulnerability-database/cve/cve-2025-49132
This improvement is based on the original PoC from 0xtensho/CVE-2025-49132-poc.
- Code Quality: Refactored to follow Python Black and PEP8 standards
- Better HTTP Client: Replaced
os.system()withrequestslibrary for more reliable HTTP requests - Descriptive Variables: Renamed variables for better code readability
- CLI Interface: Added proper command-line argument parsing with help messages
- Error Handling: Improved error handling and user feedback
python poc.py --host <target_host> --command <command_to_execute># Execute 'whoami' command
python poc.py --host 192.168.1.100 --command "whoami"
# Execute 'id' command
python poc.py --host example.com --command "id"--host,-H: Target host (required)--command,-c: Command to execute on target (required)--help,-h: Show help message
requests>=2.25.0
Install with:
pip install requestsThis tool is for educational and authorized penetration testing purposes only. Only use on systems you own or have explicit permission to test.# CVE-2025-49132_poc