Share
## https://sploitus.com/exploit?id=D7AF602D-8C0B-5866-857F-78C80ED99A68
# ๐Ÿšจ CVE-2025-1718 Scanner - FTP Reboot Vulnerability in Hitachi Energy Devices

![CVE](https://img.shields.io/badge/CVE-2025--1718-red) ![Python](https://img.shields.io/badge/Language-Python-blue) ![Status](https://img.shields.io/badge/Status-Active-green)

## ๐Ÿ“Œ Description

**CVE-2025-1718** is a high-severity vulnerability in **Hitachi Energy Relion 670/650** and **SAM600-IO** products. A local authenticated user with FTP access can **cause the device to reboot** unexpectedly by **exhausting disk space**, leading to **denial of service (DoS)**.

- **Attack Vector:** Network (FTP)
- **Privileges Required:** Low (Authenticated FTP access)
- **Impact:** System reboot (DoS)
- **CVSS Score:** 7.1 (High)

---

## ๐Ÿ› ๏ธ Features

- โœ… FTP authentication and connection
- โœ… Disk space check trigger
- โœ… Log output with color and effects
- โœ… Safe threading & timeout
- โœ… Custom banner

---

## ๐Ÿš€ Installation

```bash
git clone https://github.com/issamjr/CVE-2025-1718-Scanner.git
cd CVE-2025-1718-Scanner
pip install -r requirements.txt
```

---

## โš™๏ธ Usage

```bash
python3 scanner.py --host <TARGET_IP> --port 21 --user <FTP_USER> --pass <FTP_PASS>
```

Example:

```bash
python3 scanner.py --host 192.168.1.100 --port 21 --user test --pass test123
```

---

## โš ๏ธ Disclaimer

This tool is for educational and authorized testing purposes only. Misuse may violate laws and result in criminal charges.

---

## ๐Ÿ‘จโ€๐Ÿ’ป Developed by [issamjr](https://github.com/issamjr)