Skip to content

Immersive-Labs-Sec/CVE-2025-31161

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2025-31161

Proof of Concept for CVE-2025-31161 / CVE-2025-2825

This POC will exploit the authbypass vulnerability to create a new user account with Admin level permissions. The Auth Bypass requires the username (target_user) of an existing user on the CrushFTP server. The default is set to crushadmin

Usage

usage: cve-2025-31161.py [-h] [--target_host TARGET_HOST] [--port PORT] [--target_user TARGET_USER] [--new_user NEW_USER] [--password PASSWORD]

Exploit CVE-2025-2825

options:
  -h, --help            show this help message and exit
  --target_host TARGET_HOST
                        Target host
  --port PORT           Target port
  --target_user TARGET_USER
                        Target user
  --new_user NEW_USER   New user to create
  --password PASSWORD   Password for the new user

Detction and Mitigation.

For Immersive Customers you can find Practical Offensive and Defensive labs in the platform under the Latest CVEs section.

Additional details on this exploit can be found on Attacker KB

https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis

About

Proof of Concept for CVE-2025-31161 / CVE-2025-2825

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages