Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49844 PoC — Redis Lua Use-After-Free may lead to remote code execution

Source
Associated Vulnerability
Title:Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
Description:Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
Description
CVE-2025-49844 POC 
Readme
# CVE-2025-49844_POC
CVE-2025-49844 POC 
-h 查看帮助信息

···
Redis 存在Redis Lua脚本远程代码执行漏洞(CVE-2025-49844)。该漏洞的成因核心是 Redis 中 Lua 脚本引擎与内存管理逻辑的交互存在设计缺陷。
···

···
相关URL:https://nvd.nist.gov/vuln/detail/CVE-2025-49844
···

免责声明:请确保在有授权的情况下使用此脚本,禁止用于未授权的网络攻击。
File Snapshot

[4.0K] /data/pocs/006da9c4f75c9dc4b695d328d79197245242f6ed ├── [9.6K] CVE-2025-49844.py ├── [ 11K] LICENSE ├── [ 436] README.md └── [ 29] requirements.txt 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →