- Go 100%
| .gitignore | ||
| LICENSE | ||
| PoC.go | ||
| README.md | ||
CVE‑2025‑54322 Proof of Concept
Overview
This repository contains a proof‑of‑concept (PoC) for CVE‑2025‑54322, a critical remote code execution (RCE) vulnerability affecting Xspeeder SXOS routers.
The vulnerability has been rated CVSS 9.8 (Critical) due to its ease of exploitation and potential for full device compromise.
Vulnerability Description
The flaw stems from an unsafe eval() call in the router firmware from the chkid URL parameter.
Untrusted input is evaluated directly, allowing attackers to inject and execute arbitrary Python commands and even scripts.
Impact
- Remote attackers can gain full control of affected devices.
- Exploitation requires only network access to the router’s management interface.
- Successful compromise may lead to:
- Persistent backdoors
- Traffic interception
- Pivoting into internal networks
Proof of Concept
This PoC demonstrates the vulnerability by sending crafted input to the vulnerable chkid URL parameter
Usage
Go build PoC.go
with the compiled binary, run it and it will prompt from stdin the target and command to run
Output:
A Go based PoC of CVE-2025-54322
Enter the Target to attack: http://192.168.1.1
Choose an option:
1) Run bash command
2) Run Python script from file
from here, choose your desired option and fill the parameters