Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Oracle Corporation | Oracle Concurrent Processing | 12.2.3 ~ 12.2.14 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Detection for CVE-2025-61882 | https://github.com/rxerium/CVE-2025-61882 | POC Details |
| 2 | None | https://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882 | POC Details |
| 3 | Exploit for CVE-2025-61882 (do not use without any written permission). | https://github.com/Sachinart/CVE-2025-61882 | POC Details |
| 4 | Oracle Concurrent Processing 12.2.3-12.2.14 contains a remote code execution caused by unauthenticated network access via HTTP, letting unauthenticated attackers fully compromise the system, exploit requires network access via HTTP. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-61882.yaml | POC Details |
| 5 | CVE-2025-61882 | https://github.com/B1ack4sh/Blackash-CVE-2025-61882 | POC Details |
| 6 | None | https://github.com/zerozenxlabs/CVE-2025-61882-Oracle-EBS | POC Details |
| 7 | Detection for CVE-2025-61882 | https://github.com/rxerium/CVE-2025-61882-CVE-2025-61884 | POC Details |
| 8 | None | https://github.com/RootAid/CVE-2025-61882 | POC Details |
| 9 | POC of CVE-2025-61882 | https://github.com/MindflareX/CVE-2025-61882-POC | POC Details |
| 10 | A critical pre-authentication Remote Code Execution (RCE) flaw in Oracle E-Business Suite (versions 12.2.3 - 12.2.14) allows attackers to gain full control over vulnerable servers via malicious HTTP requests - now actively exploited in the wild. | https://github.com/AdityaBhatt3010/CVE-2025-61882-Oracle-E-Business-Suite-Pre-Auth-RCE-Exploit | POC Details |
| 11 | Detects Oracle E-Business Suite (CVE-2025-61882). Detection: multi-tier checks — fingerprinting, version checks, endpoint & SSRF tests, timing analysis & controlled exploitation 4 high-confidence results. Default = safe fingerprinting only. Set aggressive=true 2 enable active/probing checks use w/caution. Provided By BattalionX BattalionX@proton.me | https://github.com/BattalionX/http-oracle-ebs-cve-2025-61882.nse | POC Details |
| 12 | CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit | https://github.com/godnish/CVE-2025-61882 | POC Details |
| 13 | 🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats. | https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884 | POC Details |
| 14 | CVE-2025-61882 — Critical Oracle EBS RCE: Analysis & Response | https://github.com/AshrafZaryouh/CVE-2025-61882-Executive-Summary | POC Details |
| 15 | CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit | https://github.com/GhoStZA-debug/CVE-2025-61882 | POC Details |
| 16 | Sorumluluk Reddi Kendi sorumluluğunuzda kullanın, size ait olmayan veya tarama izninizin olmadığı altyapılarda gerçekleştireceğiniz yasa dışı faaliyetlerden sorumlu olmayacağım. | https://github.com/Zhert-lab/CVE-2025-61882-CVE-2025-61884 | POC Details |
| 17 | CVE-2025-61882 | https://github.com/Ashwesker/Blackash-CVE-2025-61882 | POC Details |
| 18 | None | https://github.com/George0Papasotiriou/CVE-2025-61882-Oracle-BI-Publisher-RCE | POC Details |
| 19 | Real-world information security risk assessment based on the Oracle E-Business Suite zero-day (CVE-2025-61882). Analyses attacker methods, enterprise risks, and mitigation strategies using ISO 27001, NIST CSF, Cyber Essentials and COBIT. | https://github.com/sid-203/Enterprise-Information-Security-Risk-Assessment-Oracle-E-Business-Suite-Case-Study | POC Details |
No public POC found.
Login to generate AI POCNo comments yet