Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-20265 PoC — Cisco Secure Firewall Management Center Software Radius Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Cisco Secure Firewall Management Center Software Radius Remote Code Execution Vulnerability (CVE-2025-20265)
Description:A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.  This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level. Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.
Description
This is a minimal, educational simulation that demonstrates the _impact_ class of a management-plane parsing RCE (inspired by CVE-2025-20265). It intentionally executes commands from crafted input for local learning only.
Readme
# Day08 — Cisco FMC-style Management RCE (Simulation)

This is a minimal, educational simulation that demonstrates the _impact_ class of a management-plane parsing RCE (inspired by CVE-2025-20265). It intentionally executes commands from crafted input for local learning only.

## Quickstart

```bash
chmod +x entrypoint.sh exploit.sh
docker build -t fmc-sim .
docker run --rm -d -p 8444:8444 --name fmc-sim fmc-sim
```
File Snapshot

[4.0K] /data/pocs/ac6f5e8ba32e4c374f9515e9b8e87aac91b82010 ├── [ 224] DISCLAIMER.md ├── [ 435] Dockerfile ├── [ 231] entrypoint.sh ├── [ 313] exploit.sh ├── [ 422] README.md └── [2.4K] server.py 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →