Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail

Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail

Posted on January 31, 2026January 31, 2026 By CWS

The newest replace to the Metasploit Framework this week offers a major enhancement for penetration testers and pink teamers, introducing seven new exploit modules concentrating on generally used enterprise software program.

The spotlight of this launch is a complicated trio of modules directed at FreePBX, alongside important distant code execution (RCE) capabilities for Cacti and SmarterMail.

This replace underscores the continued threat posed by chaining authentication bypass flaws with secondary vulnerabilities to realize full system compromise.

FreePBX Vulnerability Chaining

Probably the most vital addition to the framework entails three distinct modules concentrating on FreePBX, an open-source GUI that controls Asterisk (PBX). Researchers Noah King and msutovsky-r7 have developed a way to chain a number of vulnerabilities to escalate privileges from an unauthenticated state to distant code execution.

The assault chain begins with CVE-2025-66039, an authentication bypass vulnerability that permits unauthorized actors to bypass login protocols. As soon as the authentication barrier is breached, the framework provides two distinct paths to RCE.

The primary exploit path leverages a SQL injection vulnerability recognized as CVE-2025-61675. By injecting malicious SQL instructions, an attacker can manipulate the database to insert a brand new job into the cron_job desk, successfully scheduling the execution of arbitrary code.

Alternatively, the second module exploits CVE-2025-61678, an unrestricted file add flaw current within the firmware add operate. This permits the attacker to add a webshell on to the server, granting rapid management.

A 3rd auxiliary module on this set makes use of the identical SQL injection flaw to easily create a rogue administrator account, demonstrating the flexibility of the exploit chain.

Essential RCE in Cacti and SmarterMail

Past the VoIP sector, the replace addresses extreme flaws in monitoring and communication platforms. A brand new module targets Cacti, a well-liked community monitoring instrument, particularly exploiting CVE-2025-24367.

This vulnerability impacts variations previous to 1.2.29 and permits unauthenticated distant code execution by way of the graph template mechanism. Given Cacti’s widespread use in infrastructure monitoring, this module represents a high-priority check case for community directors.

Concurrently, the framework has added help for exploiting CVE-2025-52691 in SmarterTools SmarterMail. This unauthenticated file add vulnerability depends on path traversal manipulation throughout the guid variable.

The module is notably versatile concerning the underlying working system. If the goal is operating Home windows, the exploit drops a webshell within the webroot listing. Conversely, if the goal is a Linux surroundings, it achieves persistence and execution by making a cron job in /and so forth/cron.d.

The discharge additionally enhances post-exploitation capabilities with new persistence modules. A brand new Burp Suite extension persistence module permits attackers to put in a malicious extension on each the Professional and Neighborhood variations, inflicting it to execute at any time when the consumer launches the applying. Moreover, the staff has consolidated Home windows and Linux SSH key persistence right into a single, unified module to streamline operations.

On the upkeep entrance, a number of important bugs have been addressed. A formatting concern that prevented hash knowledge from being appropriate with the John the Ripper password cracker has been resolved.

Moreover, a logic error within the SSH login scanner, which beforehand reported profitable logins as failures when periods couldn’t be opened, has been fastened to make sure correct reporting throughout engagements.

Module NameCVE IDTarget SystemImpactFreePBX Endpoint SQLiCVE-2025-66039, CVE-2025-61675FreePBXRemote Code ExecutionFreePBX Firmware UploadCVE-2025-66039, CVE-2025-61678FreePBXRemote Code ExecutionFreePBX Admin CreationCVE-2025-66039, CVE-2025-61675FreePBXPrivilege EscalationCacti Graph Template RCECVE-2025-24367Cacti (< 1.2.29)Distant Code ExecutionSmarterMail GUID UploadCVE-2025-52691SmarterMailRemote Code ExecutionBurp Extension PersistenceN/ABurp SuitePersistenceSSH Key PersistenceN/ALinux / WindowsPersistence

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Cacti, Covering, Exploit, FreePBX, Metasploit, Modules, Releases, SmarterMail

Post navigation

Previous Post: In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
Next Post: CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

Related Posts

FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings Cyber Security News
Sandworm Hackers Attacking Ukranian Organizations with Data Wiper Malwares Sandworm Hackers Attacking Ukranian Organizations with Data Wiper Malwares Cyber Security News
5 New Trends In Phishing Attacks On Businesses  5 New Trends In Phishing Attacks On Businesses  Cyber Security News
OpenAI Releases GPT-5.1-Codex-Max that Performs Coding Tasks Independently OpenAI Releases GPT-5.1-Codex-Max that Performs Coding Tasks Independently Cyber Security News
Threat Actors Hijacking MS-SQL Server to Deploy XiebroC2 Framework Threat Actors Hijacking MS-SQL Server to Deploy XiebroC2 Framework Cyber Security News
Critical React2Shell Vulnerability Under Attack Critical React2Shell Vulnerability Under Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark