{"uuid": "ad50a3bb-e930-44a2-b781-f367edfc3057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24016", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/3694", "content": "\ud83d\udd2a Wazuh \u2014 Unsafe Deserialization RCE (CVE-2025-24016)\n\nAn unsafe deserialization vulnerability in Wazuh servers allows remote code execution through unsanitized dictionary injection in DAPI requests/responses. If an attacker injects an unsanitized dictionary into a DAPI request or response, they can craft an unhandled exception, allowing arbitrary Python code execution.\n\n\ud83d\udd17  Source: https://github.com/0xjessie21/CVE-2025-24016\n\n#wazuh #deserialization #rce #cve\n\ud83d\udd39 Share &amp; Support Us \ud83d\udd39\n\ud83d\udcf1 Channel : @ZeroEthical_Course", "creation_timestamp": "2025-02-18T21:26:26.000000Z"}