Share
## https://sploitus.com/exploit?id=0FBA293F-BA27-5E52-93BE-EF2CB3164519
# CVE-2025-4427 & CVE-2025-4428 Vulnerability Scanner


Advanced detection tool for identifying systems vulnerable to the CVE-2025-4427 and CVE-2025-4428 exploit chain. This security scanner helps identify vulnerable endpoints and demonstrates proof-of-concept exploitation.
## Features
- ๐ก๏ธ **Vulnerability Detection**: Identifies vulnerable systems through signature analysis
- ๐ป **Command Execution**: Allows safe testing of vulnerability via controlled command execution
- ๐ **Retry Mechanism**: Automatic retry for failed connections
- ๐ **Logging System**: Detailed logging with file and console outputs
- ๐ **Proxy Support**: Configurable proxy settings for traffic inspection
- ๐ง **Multi-Shell Support**: Compatible with both bash and sh environments
- ๐ **Output Redirection**: Save results to external files
## Installation
1. **Requirements**:
- Python 3.6+
- requests library
2. **Install dependencies**:
```bash
pip install requests
```
## Usage
### Basic Command
```
python scanner.py -H http://target-site.com/
```
### Full Syntax
```
python scanner.py -H [TARGET_URL] [OPTIONS]
```
### Options
| Parameter | Description |
| :-------: | :-----------------------------------------------: |
| -H | Target URL (required) |
| -c | Command to execute (default: 'id') |
| -s | Shell type [bash |
| -x | Proxy configuration (e.g.: http://127.0.0.1:8080) |
| -t | Request timeout in seconds (default: 15) |
| -r | Connection retry attempts (default: 2) |
| -o | Output file path |
## Examples
1. Basic vulnerability check:
```
python scanner.py -H https://example.com/
```
1. Custom command execution with proxy:
```
python scanner.py -H http://internal-server/ -c "uname -a" -x http://proxy:8080
```
1. Full test with output redirection:
```
python scanner.py -H http://test-site.com/ -s sh -t 30 -o results.txt
```
## Important Notes
- ๐จ **Legal Compliance**: Use only on authorized systems
- ๐ **Security Advisory**: For testing purposes only
- โ ๏ธ **Ethical Warning**: Do not use for illegal activities
- ๐ **Best Practice**: Always verify results manually
- ๐ **Accuracy**: False positives/negatives possible - use as initial screening tool
## Exit Codes
| Code | Description |
| :--: | :------------------------: |
| 0 | Vulnerable system detected |
| 1 | No vulnerability found |
| 2 | Execution error occurred |
## License
Distributed under MIT License. See `LICENSE` for full text.