## https://sploitus.com/exploit?id=5D442689-79CB-5CB8-A52A-804E8864ED89
# CVE-2025-31161
Proof of Concept for CVE-2025-31161 / CVE-2025-2825
This POC will exploit the authbypass vulnerability to create a new user account with Admin level permissions.
The Auth Bypass requires the username (target_user) of an existing user on the CrushFTP server. The default is set to `crushadmin`
## Usage
```
usage: cve-2025-31161.py [-h] [--target_host TARGET_HOST] [--port PORT] [--target_user TARGET_USER] [--new_user NEW_USER] [--password PASSWORD]
Exploit CVE-2025-2825
options:
-h, --help show this help message and exit
--target_host TARGET_HOST
Target host
--port PORT Target port
--target_user TARGET_USER
Target user
--new_user NEW_USER New user to create
--password PASSWORD Password for the new user
```
## Detction and Mitigation.
For Immersive Customers you can find Practical Offensive and Defensive labs in the platform under the Latest CVEs section.
Additional details on this exploit can be found on Attacker KB
https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis