Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-1974 PoC — ingress-nginx admission controller RCE escalation

Source
Associated Vulnerability
Title:ingress-nginx admission controller RCE escalation (CVE-2025-1974)
Description:A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
Description
Exploit CVE-2025-1974 with a single file.
Readme
Exploit CVE-2025-1974 with a single file.

Usage:

```
1. change server_ip and server_port in shell.c
2. make
3. GOOS=linux go build -ldflags="-w -s -extldflags "-static"" -trimpath main.go
4. run main in your controlled pod
```

File Snapshot

[4.0K] /data/pocs/64102f66a2b92232bf4f3a9ff52b80722dd33f2c ├── [ 328] build.sh ├── [4.7K] main.go ├── [ 100] Makefile ├── [ 230] README.md └── [ 728] shell.c 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →