Share
## https://sploitus.com/exploit?id=2AD4D4FE-0F61-59C6-B891-A0CD54BAADD6
# ๐Ÿ’ฅ vBulletin Remote Code Execution Scanner (replaceAdTemplate)

This Python tool automates the detection of **unauthenticated RCE** vulnerabilities in **vBulletin** via the `replaceAdTemplate` exploit vector. Based on the original proof-of-concept by **EgiX**, this version supports **batch scanning**, **multithreading**, and logs confirmed vulnerable targets to `vuln.txt`.

## ๐Ÿ”ฅ Vulnerability Details

- **Exploit Name**: `replaceAdTemplate` RCE
- **CVE**: CVE-2025-48828
- **Affected**: Vulnerable versions of vBulletin using the `ajax/api/ad/replaceAdTemplate` route
- **Impact**: Remote Code Execution (unauthenticated)

## โš™๏ธ Features

- ๐Ÿง  Automatic command execution (`id`) to confirm RCE
- ๐Ÿ”Ž Batch scan from a file (`targets.txt`)
- โšก Fast, multi-threaded scanner
- ๐Ÿงพ Logs vulnerable targets and their output to `vuln.txt`
- ๐Ÿ’ฌ Clean, modular codebase

## ๐Ÿ“ฆ Requirements

- Python 3.x
- `requests` module

Install dependencies (if not already installed):

```bash
pip install requests
```

## ๐Ÿ“‚ Usage

1. Prepare your target list
Create a file named targets.txt and add one target URL per line:
```
http://example.com/vb/
https://target.net/forum/
192.168.1.100:8080/vb/
```

2. Run the scanner:
```
python3 scanner.py
```

3. Check vuln.txt for results:
```
http://victim.com/vb | uid=33(www-data) gid=33(www-data) groups=33(www-data)
```

## โš™๏ธ Configuration

You can change these settings in the script:

COMMAND: Shell command to execute (default: id)

EXPECTED_OUTPUT: Expected substring to confirm execution (default: uid=)

THREADS: Number of concurrent scans (default: 20)

TARGET_FILE: Input file of domains (default: targets.txt)

OUTPUT_FILE: Output log file (default: vuln.txt)


## โš ๏ธ Disclaimer

This code is provided for educational and authorized security testing purposes only. Unauthorized use against systems without permission is illegal. The author and contributors are not responsible for misuse or damage caused by this software.

## ๐Ÿ™ Credits

Original exploit author: EgiX

Python adaptation & batch scanner: ill deed


## ๐Ÿ“„ License

MIT License โ€“ use responsibly.