Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-54309

CVSS 9.0 · Critical KEV EPSS 77.76% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-54309

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未保护的候选通道
Source: NVD (National Vulnerability Database)
Vulnerability Title
CrushFTP 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CrushFTP是CrushFTP公司的一款文件传输服务器。 CrushFTP 10.8.5之前版本和11.3.4_23之前版本存在安全漏洞,该漏洞源于AS2验证处理不当,可能导致远程攻击者获取管理员权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
CrushFTPCrushFTP 10 ~ 10.8.5 -

II. Public POCs for CVE-2025-54309

#POC DescriptionSource LinkShenlong Link
1CrushFTP Unauthenticated Remote Command Execution Exploithttps://github.com/issamjr/CVE-2025-54309-EXPLOITPOC Details
2CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-54309.yamlPOC Details
3Nonehttps://github.com/watchtowrlabs/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309POC Details
4CrushFTP AS2 Authentication Bypasshttps://github.com/blueisbeautiful/CVE-2025-54309POC Details
5Nonehttps://github.com/whisperer1290/CVE-2025-54309__Enhanced_exploitPOC Details
6Nonehttps://github.com/chin-tech/CrushFTP_CVE-2025-54309POC Details
7CrushFTP AS2 Authentication Bypasshttps://github.com/brokendreamsclub/CVE-2025-54309POC Details
8Exploitation scripts for the CrushFTP CVE-2025-54309: vulnerabilityhttps://github.com/foregenix/CVE-2025-54309POC Details
9Findings & july race with 0day in wildhttps://github.com/Smileyface101/CrushFTP-AS2-Bypass-Research-CVE-2025-54309POC Details
10Nonehttps://github.com/0xLittleSpidy/CVE-2025-54309POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-54309

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-54309

No comments yet


Leave a comment