Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)

Posted on August 27, 2025August 27, 2025 By CWS

A weaponized proof-of-concept exploit has been publicly launched focusing on CVE-2025-54309, a extreme authentication bypass vulnerability affecting CrushFTP file switch servers. 

The flaw permits distant attackers to realize administrative privileges by means of a race situation in AS2 validation processing, circumventing authentication mechanisms solely. 

Key Takeaways1. Race-condition exploit lets attackers bypass CrushFTP authentication.2. Public PoC on GitHub confirms susceptible situations with out including backdoors.3. Improve, allow DMZ proxy, and look ahead to POST spikes.

First exploited within the wild in July 2025, the vulnerability impacts CrushFTP variations 10 earlier than 10.8.5 and 11 earlier than 11.3.4_23 when the DMZ proxy function stays disabled, a configuration that impacts nearly all of deployed situations throughout enterprise environments.

CrushFTP 0-day Vulnerability 

The seller postmortem revealed on July 18, 2025, acknowledged energetic focusing on of CrushFTP situations however blamed customers for failing to use a silent patch that was by no means publicly introduced. 

With over 30,000 situations uncovered on-line, attackers exploited the mishandling of AS2 validation to realize administrative entry by way of HTTPS. 

Particularly, the flaw resides within the WebInterface/operate/ endpoint, the place two sequential HTTP POST requests race to set session state:

By issuing Request 1 (with the AS2-TO: crushadmin header) instantly adopted by Request 2 (omitting the header however reusing the identical session cookies), attackers win a race situation that impersonates the built-in crushadmin person and efficiently invokes setUserItem to create a brand new administrative account. 

Standalone requests return 404, however when executed at excessive concurrency, Request 2 returns a 200 OK response confirming administrative person creation.

Danger FactorsDetailsAffected ProductsCrushFTP 10 variations earlier than 10.8.5CrushFTP 11 variations earlier than 11.3.4_23ImpactAuthentication bypass, Distant code executionExploit PrerequisitesDMZ proxy function disabled;capability to ship sequential HTTPS POST requestsValid CrushAuth and currentAuth cookiesCVSS 3.1 Score9.8 (Important)

PoC Exploit

WatchTowr Labs has revealed a totally practical PoC exploit on GitHub, enabling safety groups to confirm susceptible CrushFTP situations with out including persistent backdoors. 

The PoC merely extracts the person record to verify exploitation:

Moreover, researchers suggest monitoring for anomalous spikes in POST requests to /WebInterface/operate/ with repetitive AS2-TO and cookie patterns. 

Safety groups ought to deploy intrusion detection signatures matching this race situation and implement community rate-limiting to mitigate high-frequency exploit makes an attempt.

Mitigation consists of: 

Upgrading to CrushFTP 10.8.5 or 11.3.4_23 (or later).

Allow the DMZ proxy function if not already configured.

Audit administrative person additions and validate session reuse patterns.

Organizations leveraging CrushFTP should deal with CVE-2025-54309 as a important threat and act swiftly to defend in opposition to in-the-wild exploitation.

Bored with Filling Kinds for safety & Compliance questionnaires? Automate them in minutes with 1up! Begin Your Free Trial Now!

Cyber Security News Tags:0Day, CrushFTP, CVE202554309, Exploit, PoC, Released, Vulnerability

Post navigation

Previous Post: How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses
Next Post: 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild

Related Posts

Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges Cyber Security News
10 Best ZTNA Solutions (Zero Trust Network Access) in 2025 Cyber Security News
Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News
New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines Cyber Security News
Ransomware Negotiation When and How to Engage Attackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand GDPR and Data Rights
  • Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
  • 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
  • PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
  • How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand GDPR and Data Rights
  • Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
  • 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
  • PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
  • How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News