{"uuid": "69f198bf-d2bd-4383-91e7-dd232ba6494d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49844", "type": "published-proof-of-concept", "source": "https://t.me/BugCod3/1312", "content": "Researchers discovered a critical Redis vulnerability called RediShell \ud83d\udde1\n\n(CVE-2025-49844) a CVSS 10 remote code execution flaw affecting all Redis versions. It allows attackers to send a malicious Lua script, escape the sandbox, and execute code on the host. Around 330,000 Redis instances are exposed online, 60,000 of them without authentication, and over 75% of cloud environments use Redis\u26a1\ufe0f\n\nCVE-2025-49844 (RediShell) POC \ud83d\udee1\n\nGithub\n\n#cve #poc #exploit #redishell #redis\n\nJoin Exploit Forge \ud83d\udd1d\nJoin Exploit Forge Forum \ud83d\udc51\nJoin BugCod3 \ud83e\udd1d", "creation_timestamp": "2025-10-08T17:38:04.000000Z"}