Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2025-0401 PoC — 1902756969 reggie CommonController.java download path traversal

Source
Associated Vulnerability
Title:1902756969 reggie CommonController.java download path traversal (CVE-2025-0401)
Description:A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Description
Privilege Escalation using Passwd - April Fools prank
Readme
# CVE-2025-0401 - Local Privilege Escalation via SUID Binary Abuse

## Summary

CVE-2025-0401 is a local privilege escalation vulnerability discovered in systems where the `/usr/bin/passwd` binary is misconfigured, allowing unintended root-level access when combined with specific syscall sequences. This exploit demonstrates how attackers can leverage SUID misconfigurations to simulate root shell access.

> ⚠️ This PoC is intended for educational and authorized testing environments only.

---

## Exploit Details

The vulnerability is triggered through direct syscalls involving:
- `setuid(0)`
- `setgid(0)`
- Execution of `/bin/sh`

### Syscalls used:
- `write` (1)
- `setuid` (105)
- `setgid` (106)
- `execve` (59)
- `exit` (60)

---

## Usage

```bash
git clone https://github.com/CyberSecurityUP/CVE-2025-0401.git
cd CVE-2025-0401
gcc -z execstack -fno-stack-protector exploit.c -o exploit
chmod +x exploit
./exploit
```

"Not everything said with a smile is true... especially on April 1st."
File Snapshot

[4.0K] /data/pocs/1418737338e9310fc94b0863e3ad0239ebae4dc4 ├── [ 16K] exploit ├── [2.1K] exploit.c ├── [1.2K] prank.asm ├── [1005] README.md └── [1.4K] shellcode 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →