Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-5777 PoC — NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread

Source
Associated Vulnerability
Title:NetScaler ADC and NetScaler Gateway - Insufficient input validation leading to memory overread (CVE-2025-5777)
Description:Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
Description
CitrixBleed-2 Checker & Poc automatic exploit and check token.
Readme
# CitrixBleed-2-CVE-2025-5777

## checker

checker.py http_https_host_:_port.txt result.txt 8

### better you run

OPENSSL_CONF=./openssl.cnf checker.py http_https_host_:_port.txt result.txt 8

## poc

this poc automatic exploit CVE-2025-5777 and check token exsist and after valid or not.

poc.py -u https://target.example.com -v

### better you run

OPENSSL_CONF=./openssl.cnf poc.py -u https://target.example.com -v

## thanks to 

@watchTowr & @sinsinology & @Chocapikk 

 - :)
File Snapshot

[4.0K] /data/pocs/f71040154b0e47ec15bfc85a6859fc6481da7633 ├── [3.8K] checker.py ├── [ 26] checker_requirements.txt ├── [ 172] openssl.cnf ├── [8.2K] poc.py ├── [ 83] poc_requirements.txt └── [ 482] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →