Zyxel USG FLEX H series uOS 1.31 – Privilege Escalation

# Exploit Title: Zyxel USG FLEX H series uOS 1.31 – Privilege Escalation # Date: 2025-04-23 # Exploit Author: Marco Ivaldi # Vendor Homepage: https://www.zyxel.com/ # Version: Zyxel uOS V1.31 (see https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-= =3D advisory-for-incorrect-permission-assignment-and-improper-privilege-managem= =3D ent-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025) # Tested on: Zyxel FLEX100H with Firmware V1.31(ABXF.0) and Zyxel FLEX200H with Firmware V1.31(ABWV.0) # CVE: CVE-2025-1731 …

Read More

CrushFTP 11.3.1 – Authentication Bypass

# Exploit Title: CrushFTP 11.3.1 – Authentication Bypass # Date: 2025-05-15 # Exploit Author: @İbrahimsql # Exploit Author’s github: https://github.com/ibrahimsql # Vendor Homepage: https://www.crushftp.com # Software Link: https://www.crushftp.com/download.html # Version: < 10.8.4, < 11.3.1 # Tested on: Ubuntu 22.04 LTS, Windows Server 2019, Kali Linux 2024.1 # CVE: CVE-2025-31161 # Description: # CrushFTP before…

Read More

Remote Keyboard Desktop 1.0.1 – Remote Code Execution (RCE)

# Exploit Title: Remote Keyboard Desktop 1.0.1 – Remote Code Execution (RCE) # Date: 05/17/2025 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://remotecontrolio.web.app/ # Software Link: https://apps.microsoft.com/detail/9n0jw8v5sc9m?hl=neutral&gl=US&ocid=pdpshare # Version: 1.0.1 # Tested on: Windows 10 Pro Build 19045 # Start Remote Keyboard Desktop on your windows # Preparing: # # 1. Generating payload…

Read More

ABB Cylon Aspect Studio 3.08.03 – Binary Planting

# Exploit Title: ABB Cylon Aspect Studio 3.08.03 – Binary Planting # Vendor: ABB Ltd. # Product web page: https://www.global.abb # Affected version: <=3.08.03 # Tested on: Microsoft Windows 10 Home (EN) OpenJDK 64-Bit Server VM Temurin-21.0.6+7 # Vulnerability discovered by Gjoko ‘LiquidWorm’ Krstic @zeroscience # Advisory ID: ZSL-2025-5952 # Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5952.php …

Read More

ABB Cylon Aspect 3.08.03 – Guest2Root Privilege Escalation

#!/usr/bin/env python # # # Exploit Title: ABB Cylon Aspect 3.08.03 – Guest2Root Privilege Escalation # # # Vendor: ABB Ltd. # Product web page: https://www.global.abb # Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio # Firmware: <=3.08.03 # # Summary: ASPECT is an award-winning scalable building energy management # and control solution designed to…

Read More

Java-springboot-codebase 1.1 – Arbitrary File Read

# Exploit Title: Java-springboot-codebase 1.1 – Arbitrary File Read # Google Dork: # Date: 23/May/2025 # Exploit Author: d3sca # Vendor Homepage: https://github.com/OsamaTaher/Java-springboot-codebase # Software Link: https://github.com/OsamaTaher/Java-springboot-codebase # Version: [app version] 1.1 # Tested on: Debian Linux # CVE : CVE-2025-46822 #usage: python3 cve-2025-46822.py http://victim.com /etc/passwd import argparse import requests from urllib.parse…

Read More

Grandstream GSD3710 1.0.11.13 – Stack Buffer Overflow

#!/usr/bin/env python3 # Exploit Title: Grandstream GSD3710 1.0.11.13 – Stack Buffer Overflow # Google Dork: [if applicable] # Date: 2025-05-23 # Exploit Author: Pepelux (user in ExploitDB) # Vendor Homepage: https://www.grandstream.com/ # Software Link: [download link if available] # Version: Grandstream GSD3710 – firmware:1.0.11.13 and lower # Tested on: Linux and MacOS # CVE:…

Read More

Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking

Research by: hasherezade Process Injection is one of the important techniques in the attackers’ toolkit. In the constant cat-and-mouse game, attackers try to invent its new implementations that bypass defenses, using creative methods and lesser-known APIs. Combining common building blocks in an atypical way, Check Point Research was able to create a much stealthier version…

Read More

Renewed APT29 Phishing Campaign Against European Diplomats

Highlights Check Point Research has been tracking an advanced phishing campaign conducted by APT29, a Russia linked threat group, which is targeting diplomatic entities across Europe. The campaign, which appears to be a continuation of a previous one that utilized a backdoor known as WINELOADER, impersonates a major European foreign affairs ministry to distribute fake invitations to diplomatic…

Read More