Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2025-46816 PoC — goshs route not protected, allows command execution

Source
Associated Vulnerability
Title:goshs route not protected, allows command execution (CVE-2025-46816)
Description:goshs is a SimpleHTTPServer written in Go. Starting in version 0.3.4 and prior to version 1.0.5, running goshs without arguments makes it possible for anyone to execute commands on the server. The function `dispatchReadPump` does not checks the option cli `-c`, thus allowing anyone to execute arbitrary command through the use of websockets. Version 1.0.5 fixes the issue.
Description
POC for exploit of goshs
Readme
# CVE-2025-46816
POC for exploiting **goshs** code execution on versions < **1.0.5**
File Snapshot

[4.0K] /data/pocs/6f61ac2964d22f6bdbb7098d0b0bd79e343b14ca ├── [2.0K] exp.py ├── [ 85] README.md └── [ 108] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →