高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| wftpserver | Wing FTP Server | 0 ~ 7.4.4 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Wing FTP Server versions prior to 7.4.4 are vulnerable to an unauthenticated remote code execution (RCE) flaw (CVE-2025-47812). The vulnerability arises from improper NULL byte handling in the 'username' parameter during login, which allows Lua code injection into session files. These injected session files are executed when accessing authenticated endpoints such as /dir.html, resulting in arbitrary command execution with elevated privileges. This attack is possible only when anonymous login is enabled on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-47812.yaml | POC詳細 |
| 2 | Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812) | https://github.com/4m3rr0r/CVE-2025-47812-poc | POC詳細 |
| 3 | Simple exploit for Wing FTP Server RCE (CVE-2025-47812) to run commands and get a reverse shell. For educational use only. | https://github.com/0xcan1337/CVE-2025-47812-poC | POC詳細 |
| 4 | Wing FTP Server RCE via Lua Injection | https://github.com/0xgh057r3c0n/CVE-2025-47812 | POC詳細 |
| 5 | Remote Command Execution exploit for Wing FTP Server (CVE-2025-47812) | https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed | POC詳細 |
| 6 | Exploit for CVE-2025-47812 with custom psudo shell and robust error handling. | https://github.com/pevinkumar10/CVE-2025-47812 | POC詳細 |
| 7 | Detection for CVE-2025-47812 | https://github.com/rxerium/CVE-2025-47812 | POC詳細 |
| 8 | None | https://github.com/blindma1den/CVE-2025-47812 | POC詳細 |
| 9 | CVE-2025-47812 | https://github.com/B1ack4sh/Blackash-CVE-2025-47812 | POC詳細 |
| 10 | None | https://github.com/r0otk3r/CVE-2025-47812 | POC詳細 |
| 11 | None | https://github.com/CTY-Research-1/CVE-2025-47812_Lab_environment | POC詳細 |
| 12 | Wing FTP Server RCE via Lua Injection | https://github.com/zr1p3r/CVE-2025-47812 | POC詳細 |
| 13 | CVE-2025-47812 | https://github.com/Ashwesker/Blackash-CVE-2025-47812 | POC詳細 |
| 14 | CVE-2025-47812 | https://github.com/Ashwesker/Ashwesker-CVE-2025-47812 | POC詳細 |
| 15 | CVE-2025-47812 | https://github.com/dkstar11q/Blackash-CVE-2025-47812 | POC詳細 |
| 16 | CVE-2025-47812: Wing FTP Server 7.4.3 UnauthN RCE in sh | https://github.com/matesz44/CVE-2025-47812 | POC詳細 |
| 17 | CVE-2025-47812 POC | https://github.com/shadowgit30/CVE-2025-47812 | POC詳細 |
| 18 | None | https://github.com/Nara-sakurai/CVE-2025-47812-PoC | POC詳細 |
| 19 | Unauthenticated remote code execution vulnerability in Wing FTP Server <= 7.4.3. | https://github.com/estebanzarate/CVE-2025-47812-Wing-FTP-Server-7.4.3-Unauthenticated-RCE-PoC | POC詳細 |
| 20 | RCE for WingFTP v4.7.3 | https://github.com/popyue/CVE-2025-47812 | POC詳細 |
| 21 | None | https://github.com/0xjuarez/CVE-2025-47812 | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2025-47813 | 4.3 MEDIUM | Wing FTP Server 安全漏洞 |
| CVE-2025-47811 | 4.1 MEDIUM | Wing FTP Server 安全漏洞 |
| CVE-2025-27889 | 3.4 LOW | 多款产品安全漏洞 |
まだコメントはありません