Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Detection for CVE-2025-57819 | https://github.com/rxerium/CVE-2025-57819 | POC Details |
| 2 | This is repository contains a script to check for current IOCs listed in the freepbx forum topic of the CVE-2025-57819 | https://github.com/Sucuri-Labs/CVE-2025-57819-ioc-check | POC Details |
| 3 | FreePBX SQL Injection Exploit | https://github.com/blueisbeautiful/CVE-2025-57819 | POC Details |
| 4 | A write up of CVE-2025-57819, a vulnerability affecting FreePBX 15, 16, and 17 | https://github.com/net-hex/CVE-2025-57819 | POC Details |
| 5 | FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based). | https://github.com/ImBIOS/lab-cve-2025-57819 | POC Details |
| 6 | CVE-2025-57819 | https://github.com/B1ack4sh/Blackash-CVE-2025-57819 | POC Details |
| 7 | FreePBX backdoor cleanup script used in 0-day exploitation of CVE-2025-57819 was detected. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/backdoor/freepbx-cleanup-backdoor.yaml | POC Details |
| 8 | None | https://github.com/watchtowrlabs/watchTowr-vs-FreePBX-CVE-2025-57819 | POC Details |
| 9 | FreePBX 15, 16, and 17 contain a remote code execution caused by insufficiently sanitized user-supplied data in endpoints, letting unauthenticated attackers manipulate the database and execute code remotely, exploit requires no authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-57819.yaml | POC Details |
| 10 | FreePBX SQL Injection Exploit | https://github.com/brokendreamsclub/CVE-2025-57819 | POC Details |
| 11 | FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints. | https://github.com/MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819 | POC Details |
| 12 | Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting. | https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC | POC Details |
| 13 | This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create a new admin user (poc_admin.py), and another to extract credentials using sqlmap (poc_auto_get_username_pass.py). For educational and authorized use only. | https://github.com/orange0Mint/CVE-2025-57819_FreePBX | POC Details |
| 14 | 🔍 Detect SQL injection risks in FreePBX's admin interface safely and efficiently, providing actionable insights and clean JSON reports for security teams. | https://github.com/JakovBis/CVE-2025-57819_FreePBX-PoC | POC Details |
| 15 | CVE-2025-57819 | https://github.com/Ashwesker/Blackash-CVE-2025-57819 | POC Details |
| 16 | Detects vulnerable FreePBX versions affected by CVE-2025-57819. | https://github.com/cybertechajju/cve-2025-57819 | POC Details |
| 17 | CVE-2025-57819 | https://github.com/Ashwesker/Ashwesker-CVE-2025-57819 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet