Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)

Posted on August 27, 2025August 27, 2025 By CWS

A weaponized proof-of-concept exploit has been publicly launched focusing on CVE-2025-54309, a extreme authentication bypass vulnerability affecting CrushFTP file switch servers. 

The flaw permits distant attackers to realize administrative privileges by means of a race situation in AS2 validation processing, circumventing authentication mechanisms solely. 

Key Takeaways1. Race-condition exploit lets attackers bypass CrushFTP authentication.2. Public PoC on GitHub confirms susceptible situations with out including backdoors.3. Improve, allow DMZ proxy, and look ahead to POST spikes.

First exploited within the wild in July 2025, the vulnerability impacts CrushFTP variations 10 earlier than 10.8.5 and 11 earlier than 11.3.4_23 when the DMZ proxy function stays disabled, a configuration that impacts nearly all of deployed situations throughout enterprise environments.

CrushFTP 0-day Vulnerability 

The seller postmortem revealed on July 18, 2025, acknowledged energetic focusing on of CrushFTP situations however blamed customers for failing to use a silent patch that was by no means publicly introduced. 

With over 30,000 situations uncovered on-line, attackers exploited the mishandling of AS2 validation to realize administrative entry by way of HTTPS. 

Particularly, the flaw resides within the WebInterface/operate/ endpoint, the place two sequential HTTP POST requests race to set session state:

By issuing Request 1 (with the AS2-TO: crushadmin header) instantly adopted by Request 2 (omitting the header however reusing the identical session cookies), attackers win a race situation that impersonates the built-in crushadmin person and efficiently invokes setUserItem to create a brand new administrative account. 

Standalone requests return 404, however when executed at excessive concurrency, Request 2 returns a 200 OK response confirming administrative person creation.

Danger FactorsDetailsAffected ProductsCrushFTP 10 variations earlier than 10.8.5CrushFTP 11 variations earlier than 11.3.4_23ImpactAuthentication bypass, Distant code executionExploit PrerequisitesDMZ proxy function disabled;capability to ship sequential HTTPS POST requestsValid CrushAuth and currentAuth cookiesCVSS 3.1 Score9.8 (Important)

PoC Exploit

WatchTowr Labs has revealed a totally practical PoC exploit on GitHub, enabling safety groups to confirm susceptible CrushFTP situations with out including persistent backdoors. 

The PoC merely extracts the person record to verify exploitation:

Moreover, researchers suggest monitoring for anomalous spikes in POST requests to /WebInterface/operate/ with repetitive AS2-TO and cookie patterns. 

Safety groups ought to deploy intrusion detection signatures matching this race situation and implement community rate-limiting to mitigate high-frequency exploit makes an attempt.

Mitigation consists of: 

Upgrading to CrushFTP 10.8.5 or 11.3.4_23 (or later).

Allow the DMZ proxy function if not already configured.

Audit administrative person additions and validate session reuse patterns.

Organizations leveraging CrushFTP should deal with CVE-2025-54309 as a important threat and act swiftly to defend in opposition to in-the-wild exploitation.

Bored with Filling Kinds for safety & Compliance questionnaires? Automate them in minutes with 1up! Begin Your Free Trial Now!

Cyber Security News Tags:0Day, CrushFTP, CVE202554309, Exploit, PoC, Released, Vulnerability

Post navigation

Previous Post: How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses
Next Post: 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild

Related Posts

Microsoft To Mandate MFA for Accounts Signing In to the Azure Portal Cyber Security News
GitLab Security Update – Patch For Multiple Vulnerabilities That Enables DoS Attack Cyber Security News
Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments Cyber Security News
HashiCorp Vault Vulnerability Let Attackers to Crash Servers Cyber Security News
Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New WhatsApp Worm Attacks Users with Banking Malware to Users Login Credentials
  • Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles
  • PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation
  • Malicious Code on Unity Website Skims Information From Hundreds of Customers
  • Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New WhatsApp Worm Attacks Users with Banking Malware to Users Login Credentials
  • Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles
  • PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation
  • Malicious Code on Unity Website Skims Information From Hundreds of Customers
  • Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News