{"uuid": "c9fb7e3c-cc8e-4735-a01e-828348b63170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2825", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/158", "content": "\u26a0\ufe0f CVE-2025-2825: CrushFTP Authentication Bypass \u26a0\ufe0f\n\n\ud83d\udea8 Vulnerability: Authentication bypass in CrushFTP\n\ud83d\udccc Risk Level: Critical\n\ud83d\udcca Affected Instances: 234K+ results found on FOFA\n\n\ud83d\udd0e Technical Analysis &amp; PoC:\n\ud83d\udd25 Deep Dive: ProjectDiscovery Blog\n\ud83d\udcdc PoC &amp; Exploit: GitHub PoC\n\ud83d\udd16 Exploit &amp; Nuclei Template: SecurityOnline\n\n\ud83d\udd17 Search Queries for Detection:\nFOFA Query: app=\"CrushFTP\"\nFOFA Results: View Here\n\n\ud83d\udee1 Mitigation Steps:\n\u2705 Update to the latest secured version of CrushFTP\n\u2705 Restrict access to admin panels\n\u2705 Monitor for unusual login attempts\n\n\ud83d\udd17 Stay ahead in cybersecurity: @cybersecplayground\n\n#OSINT #FOFA #CyberSecurity #BugBounty #CVE #EthicalHacking", "creation_timestamp": "2025-04-02T07:09:48.000000Z"}