Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-20265 PoC — Cisco Secure Firewall Management Center Software Radius Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Cisco Secure Firewall Management Center Software Radius Remote Code Execution Vulnerability (CVE-2025-20265)
Description:A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.  This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level. Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.
Description
Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265.  Uses official FMC API to check version, supports single/multi-target scanning, and includes  a harmless local PoC marker.
Readme
# cve2025-20265
Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265.  Uses official FMC API to check version, supports single/multi-target scanning, and includes  a harmless local PoC marker.


# Cisco FMC CVE-2025-20265 Vulnerability Checker (Safe)


**What it does:**
- Uses the official FMC REST API to query version information
- Compares against known affected versions
- Optional `--poc` mode prints a **harmless local proof-of-concept marker** when a vulnerable version is detected (nothing is sent to the target)
- Supports **single target** or **multiple targets** from a file
- Colorized output for easy reading

> ⚠️ **No exploit code** — this tool does not attempt to exploit anything or run commands on the target.

---

## Features
- ✅ Single or multi-target scanning
- ✅ Safe — read-only API calls
- ✅ Color-coded results
- ✅ Harmless local PoC marker option
- ✅ TLS verification control for self-signed certs

---

## Requirements
- Python 3.8+
- `requests` (`pip install requests`)
- Optional: `colorama` (`pip install colorama`) for better Windows color support

---

## Usage


## Multiple targets from file

targets.txt:

https://fmc1.example.com
https://fmc2.example.com


--- 

Run:

python fmc_cve2025_20265_checker.py \
  --file targets.txt \
  --user admin \
  --password 'YOURPASS'

### Single target
```bash
python fmc_cve2025_20265_checker.py \
  --single https://fmc.example.com \
  --user admin \
  --password 'YOURPASS'



Optional flags
	•	--insecure → Skip TLS verification (self-signed certs)
	•	--no-color → Disable color output
	•	--poc → Show harmless local PoC marker if target is vulnerable





File Snapshot

[4.0K] /data/pocs/b725667e931ac93d2b334b98f0b255e461518429 ├── [6.4K] fmc_cve2025_20265_checker.py ├── [1.0K] LICENSE └── [1.7K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →