Skip to main content
Mallory

Public Exploit Releases for Multiple High-Impact RCE Vulnerabilities by Chocapikk

proof-of-concept-releaserapid-weaponizationinternet-facing-service-vulnerabilityembedded-device-vulnerability
Updated March 21, 2026 at 03:28 PM2 sources
Share:
Public Exploit Releases for Multiple High-Impact RCE Vulnerabilities by Chocapikk

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Security researcher Chocapikk has released a curated collection of public exploit repositories targeting a range of unauthenticated remote code execution (RCE) vulnerabilities across various platforms. The collection includes weaponized proof-of-concept (PoC) exploits and Metasploit modules for critical CVEs such as CVE-2025-34152 (Shenzhen Aitemi M300 Wi-Fi Repeater), CVE-2024-31819 (AVideo Platform), CVE-2024-25600 (Bricks), CVE-2023-50917 (MajorDoMo), CVE-2025-32432 (CraftCMS), and others. These tools are designed to facilitate security testing and highlight the risks posed by unpatched systems, with several exploits enabling unauthenticated attackers to gain remote shell access or escalate privileges on vulnerable targets.

The public availability of these exploits increases the urgency for organizations to patch affected systems and monitor for exploitation attempts. Chocapikk's contributions are widely referenced in the security community, with mentions in multiple security news outlets and integration into major exploit frameworks like Metasploit. The release of these tools underscores the ongoing threat posed by rapidly weaponized vulnerabilities and the importance of proactive vulnerability management and detection strategies for enterprise defenders.

Timeline

  1. Nov 8, 2025

    Researchers including Chocapikk are credited with disclosures

    Security researchers, including Chocapikk, were credited with discovering and disclosing several of the vulnerabilities referenced in the roundup. The disclosures contributed to public awareness of the affected platforms and associated exploitation risks.

  2. Nov 8, 2025

    CISA and other organizations issue alerts on active exploitation

    CISA and other organizations warned about active exploitation of some of the vulnerabilities, particularly those affecting Microsoft SharePoint and Atlassian Confluence. These alerts underscored the urgency for organizations to patch and apply mitigations.

  3. Jan 1, 2024

    Public PoCs and Metasploit support increase exploitation risk

    During 2024 and 2025, public proof-of-concept exploits and Metasploit modules were released for several of these vulnerabilities, lowering the barrier to exploitation and increasing the likelihood of widespread attacks. The references describe this as accelerating real-world abuse of the flaws.

  4. Jan 1, 2024

    Critical RCE flaws are discovered and exploited across major platforms

    Throughout 2024 and 2025, multiple critical remote code execution vulnerabilities were discovered and actively exploited in widely used software, including Wing FTP Server, Craft CMS, CyberPanel, Microsoft SharePoint, and Atlassian Confluence. The activity included zero-day exploitation, remote shell access, privilege escalation, and full system compromise.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

November 8, 2025 at 12:00 AM
November 8, 2025 at 12:00 AM

Related Stories

Public PoC Exploits Surfaced for CVE-2026-34177 and CVE-2025-7389

Public PoC Exploits Surfaced for CVE-2026-34177 and CVE-2025-7389

Public GitHub repositories were flagged for newly published proof-of-concept exploits tied to two high-severity vulnerabilities: **`CVE-2026-34177`**, a VM low-level restriction bypass involving `raw.apparmor` and `raw.qemu.conf`, and **`CVE-2025-7389`**, an unauthorized arbitrary file-read issue via RMI in an AdminServer interface. The monitoring identified repositories advertising exploit code or demonstrations for both flaws, indicating that offensive tradecraft is now publicly accessible. The referenced tracking activity monitors GitHub for exploit and PoC publications, ranks results by most recently updated repositories, and limits visible results to the first 15 entries for performance reasons. For defenders, the appearance of public exploit material raises the urgency of validating exposure to affected virtualization and AdminServer deployments, prioritizing patching or mitigations, and increasing detection coverage for exploitation attempts targeting these CVEs.

3 weeks ago
Active Exploitation of Critical RCE Vulnerabilities in Enterprise Infrastructure (Cisco UC and VMware vCenter)

Active Exploitation of Critical RCE Vulnerabilities in Enterprise Infrastructure (Cisco UC and VMware vCenter)

Reports warn of **in-the-wild exploitation** of critical remote code execution vulnerabilities affecting widely deployed enterprise infrastructure. One report describes a purported Cisco Unified Communications zero-day, **CVE-2024-20253**, impacting *Cisco Unified Communications Manager (Unified CM)*, *Cisco Unity Connection*, and *Webex Calling Dedicated Instance*, and claims it enables **unauthenticated command execution** via the web management interface, creating risk of full system compromise and rapid opportunistic scanning of internet-exposed instances. Separately, **CISA added Broadcom VMware vCenter Server CVE-2024-37079** (CVSS 9.8) to the **Known Exploited Vulnerabilities (KEV)** catalog based on evidence of exploitation; the issue is described as a **DCE/RPC heap overflow** that can lead to RCE via specially crafted network packets, and Broadcom updated its advisory to acknowledge observed exploitation. A third item (Rapid7’s Metasploit wrap-up) is not about either of these active-exploitation advisories; it covers new Metasploit modules for unrelated vulnerabilities (e.g., Oracle E-Business Suite **CVE-2025-61882** and Splunk issues), which may increase general exploitation capability but does not substantively corroborate the Cisco or VMware events.

1 months ago
Multiple High-Impact Vulnerabilities Disclosed Across Diverse Software Platforms

Multiple High-Impact Vulnerabilities Disclosed Across Diverse Software Platforms

A series of critical and high-severity vulnerabilities have been disclosed affecting a wide range of software products, including workflow automation tools, web applications, network devices, and desktop software. Notable issues include remote code execution (RCE) flaws in *n8n*, *Lilac-Reloaded for Nagios*, *FileZilla Client*, and *AVideo*, as well as privilege escalation vulnerabilities in products like *Versa SASE Client*, *AspEmail*, and *ActFax*. Several vulnerabilities allow unauthenticated attackers to upload arbitrary files, bypass authentication, or exploit weak session management, potentially leading to full system compromise or unauthorized access to sensitive data. Many of these vulnerabilities have public exploits available, increasing the risk of active exploitation in the wild. Vendors have released patches for several of the affected products, and administrators are strongly advised to update to the latest versions or apply recommended mitigations. The vulnerabilities span a variety of attack vectors, including buffer overflows, improper input validation, insecure file upload mechanisms, and misconfigured authentication endpoints. Organizations should prioritize patching systems exposed to the internet and review access controls to limit the impact of potential exploitation. Immediate attention is warranted for products with critical CVSS scores and those with known public exploits.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.