Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for Critical Lua Engine Vulnerabilities

Posted on October 8, 2025October 8, 2025 By CWS

Three newly disclosed vulnerabilities have been recognized within the Lua scripting engine of Redis 7.4.5, every presenting extreme dangers of distant code execution and privilege escalation. 

Redrays has launched an in depth proof-of-concept (PoC) to take advantage of these vulnerabilities, which is now publicly out there. Organizations are urged to behave instantly.

Use-After-Free Flaw (CVE-2025-49844)

This vulnerability arises when TString objects will not be correctly protected throughout script parsing. Particularly, in luaY_parser, the Lua parser neglects to safeguard a newly created TString, making it inclined to untimely rubbish assortment and use-after-free circumstances:

The patched code protects the item on the stack earlier than parsing:

Attackers can exploit this problem for distant code execution by rigorously triggering rubbish assortment in the course of the parsing course of.

Integer Overflow Vulnerability (CVE-2025-46817)

The unpack() operate incorrectly calculates factor counts, enabling stack corruption when known as with excessive vary parameters. 

By manipulating arguments equivalent to unpack({1,2,3}, -2, 2147483647), attackers might bypass array bounds and even execute arbitrary code.

Metatable Privilege Escalation Flaw (CVE-2025-46818)

This flaw permits modification of important metatables, like these for strings and numbers, as a result of they don’t seem to be correctly protected as read-only. 

By altering metatables, a malicious actor could inject logic that performs privilege escalation or code execution within the context of different customers.

RedRays acknowledged {that a} strong Python-based PoC verifies the criticality of all three vulnerabilities. The PoC automates:

Aggressive heap and rubbish assortment stress assessments for use-after-free exploitation (CVE-2025-49844),

Fuzzing of the unpack() name to set off integer overflow and stack corruption (CVE-2025-46817),

Manipulation of fundamental sort metatables to show privilege escalation by way of crafted Lua scripts (CVE-2025-46818).

The code connects to a goal Redis occasion and runs as much as ten full-stack assessments, confirming exploitability and the presence or absence of correct patching. 

These technical checks leverage customized Lua scripts despatched by way of Redis EVAL instructions, exposing susceptible server states and printing crash/output proof.

CVETitleSeverityCVE-2025-49844Use-After-Free in Lua Parser (deps/lua/src/lparser.c:387)CriticalCVE-2025-46817Integer Overflow in unpack() (deps/lua/src/lbaselib.c)CriticalCVE-2025-46818Metatable Privilege Escalation (script_lua.c, eval.c)Crucial

Mitigations

Redis directors should instantly replace to patched variations. These CVEs, confirmed by supply assessment and sensible exploitation, collectively develop the Redis assault floor, exposing manufacturing servers to real-world threats, particularly the place EVAL entry is obtainable. 

Organizations working Redis 7.4.5 ought to deploy fixes at once, as attackers can exploit these flaws to attain full distant code execution and unauthorized privilege escalation.

Speedy patching is important for all internet-facing or untrusted Redis deployments.

Cyber Consciousness Month Provide: Upskill With 100+ Premium Cybersecurity Programs From EHA’s Diamond Membership: Be part of At this time

Cyber Security News Tags:Critical, Engine, Exploit, Lua, PoC, Released, Vulnerabilities

Post navigation

Previous Post: Radiflow Unveils New OT Security Platform
Next Post: Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now

Related Posts

Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors Cyber Security News
New ModSecurity WAF Vulnerability Let Attackers Crash the System Cyber Security News
Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions Cyber Security News
Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access Cyber Security News
Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers Cyber Security News
Top 10 Best Digital Footprint Monitoring Tools For Organizations 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Virtual Event Today: Zero Trust & Identity Strategies Summit
  • New Fully Undetectable FUD Android RAT Hosted on GitHub
  • Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities 
  • TamperedChef Malware as PDF Editor Harvest Browser Credentials and Allows Backdoor Access
  • Google Offers Up to $20,000 in New AI Bug Bounty Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Virtual Event Today: Zero Trust & Identity Strategies Summit
  • New Fully Undetectable FUD Android RAT Hosted on GitHub
  • Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities 
  • TamperedChef Malware as PDF Editor Harvest Browser Credentials and Allows Backdoor Access
  • Google Offers Up to $20,000 in New AI Bug Bounty Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News