Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-41373 PoC — SQL injection vulnerability in Gandia Integra Total

Source
Associated Vulnerability
Title:SQL injection vulnerability in Gandia Integra Total (CVE-2025-41373)
Description:A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/hislistadoacciones.php.
Description
PoC for CVE-2025-41373  Authenticated SQL Injection in Gandia Integra Total v2.1.2217.3–4.4.2236.1  
Readme
# CVE-2025-41373 – SQL Injection in Gandia Integra Total

**Author:** Byte Reaper  
**CVE:** CVE-2025-41373  
**Vulnerability:** Authenticated SQL Injection  
**Affected Path:**   /encuestas/integraweb_v4/integra/html/view/hislistadoacciones.php?idestudio=<input>

**Description:**  
This endpoint concatenates the `idestudio` parameter directly into an SQL query without proper sanitization or parameterization, allowing an attacker to inject arbitrary SQL. This PoC leverages both boolean-based and time-based techniques to detect and demonstrate the vulnerability.

## Usage

```
# Build
gcc exploit.c argparse.c -o exploit -lcurl

# Run exploit against <URL>
./exploit -u <URL>

# Verbose output
./exploit -u <URL> -v

# WAF detection mode
./exploit -u <URL> -w
Replace <URL> with the target base URL (e.g. http://127.0.0.1).
```
## References:


  - NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-41373
  
  - incibe : https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gandia-integra-total-tesi

  
## License :
MIT License






File Snapshot

[4.0K] /data/pocs/7295aff0249695bbfa58f7a5c69b9404931a3fed ├── [ 24K] exploit.c ├── [1.0K] LICENSE └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →