## https://sploitus.com/exploit?id=E0FDD89F-D6F6-5631-8800-4AF1C4966AAB
# CVEâ2025â5964 Path Traversal PoC for MâFiles
> **Author:** Byte Reaper
> **Telegram:** @ByteReaper0
---
## Overview
This repository contains a **ProofâofâConcept (PoC)** in C for a suspected **Path Traversal** vulnerability in **MâFiles** version **25.6.14925.0**.
The PoC (file `exploit.c`) attempts to read sensitive files (e.g. `/etc/passwd`) by injecting traversal payloads into REST API endpoints.
---
## Important Notice
- **Not a confirmed exploit**:
All parameters and endpoints were derived from public documentation and OSINT.
**I do *not* have access** to a licensed or demo instance of MâFiles to verify this for real.
- **Use responsibly**:
Do *not* run against systems you donât own or have explicit permission to test.
This code is provided for research and authorized security testing only.
- **Contact**:
If you have access to a working MâFiles 25.6.14925.0 instance (free trial or licensed), please get in touch on Telegram to refine this PoC:
**@ByteReaper0**
---
## Files
| Filename | Description |
|---------------|------------------------------------------------------------------|
| `exploit.c` | Main PoC source; sends traversal payloads to MâFiles REST API |
| `argparse.c` | Simple commandâline parsing helper |
| `argparse.h` | Header for `argparse.c` |
| `README.md` | This documentation |
---
## Building
You need:
- **GCC** (or any modern C compiler)
- **libcurl** development headers
- **pthread** (only if you later add threading)
# On Debian/Ubuntu:
sudo apt update && sudo apt install build-essential libcurl4-openssl-dev
# Compile:
gcc exploit.c argparse.c -o CVE-2025-5964 -lcurl
## Usage
./CVE-2025-5964 -u <TARGET_URL>
Replace <TARGET_URL> with your MâFiles endpoint, for example:
./CVE-2025-5964 -u http://192.168.0.10
The PoC will iterate a set of traversal payloads against these query parameters:
?q=
?o=
?d=
It prints each tested URL, the HTTP response code (e.g. 200 or 404), and flags any response containing common filesystem markers (root:x:, /bin/bash, etc.) as a âPotential LFI hit.â
## How It Works
Agent Rotation
Rotates through a list of realistic UserâAgent strings to help bypass naive filtering.
Traversal Payloads
A variety of ../, URLâencoded and Base64 variants to maximize chance of bypass.
Response Analysis
200Â OK + presence of UNIX file markers â flagged as potential success.
All other status codes are still logged for manual review.
Throttling
A 1âŻsecond sleep() between requests to avoid tripping simple rateâlimits or WAF rules.
## Extending & Customization
Add more payloads: edit the payloads[] array in exploit.c.
Custom headers: extend agentSend() or add curl_slist_append() calls.
Responsible Disclosure & Disclaimer
Research Only
This code is intended for security research, responsible disclosure, and private testing.
No Warranty
Provided âasâisâ with no guarantee of functionality or safety.
Legal
Running this PoC against unauthorized targets may violate laws. Always obtain permission.
## Contact
Byte Reaper
Telegram: @ByteReaper0