Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CrushFTP Unauthenticated Remote Command Execution Exploit | https://github.com/issamjr/CVE-2025-54309-EXPLOIT | POC Details |
| 2 | CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-54309.yaml | POC Details |
| 3 | None | https://github.com/watchtowrlabs/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309 | POC Details |
| 4 | CrushFTP AS2 Authentication Bypass | https://github.com/blueisbeautiful/CVE-2025-54309 | POC Details |
| 5 | None | https://github.com/whisperer1290/CVE-2025-54309__Enhanced_exploit | POC Details |
| 6 | None | https://github.com/chin-tech/CrushFTP_CVE-2025-54309 | POC Details |
| 7 | CrushFTP AS2 Authentication Bypass | https://github.com/brokendreamsclub/CVE-2025-54309 | POC Details |
| 8 | Exploitation scripts for the CrushFTP CVE-2025-54309: vulnerability | https://github.com/foregenix/CVE-2025-54309 | POC Details |
| 9 | Findings & july race with 0day in wild | https://github.com/Smileyface101/CrushFTP-AS2-Bypass-Research-CVE-2025-54309 | POC Details |
| 10 | None | https://github.com/0xLittleSpidy/CVE-2025-54309 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet