Exploit Against FreePBX (CVE-2025-57819) with code execution., (Tue, Oct 7th)

FreePBX is a popular PBX system built around the open source VoIP system Asterisk. To manage Asterisk more easily, it provides a capable web-based admin interface. Sadly, like so many web applications, it has had its share of vulnerabilities in the past. Most recently, a SQL injection vulnerability was found that allows attackers to modify the database.

Continue reading Exploit Against FreePBX (CVE-2025-57819) with code execution., (Tue, Oct 7th)

Posted in Uncategorized

Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)

This weekend, Oracle published a surprise security bulletin announcing an exploited vulnerability in Oracle E-Business Suite. As part of the announcement, which also included a patch, Oracle published IoC observed as part of the incident response [1].

Continue reading Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)

Posted in Uncategorized

More .well-known Scans, (Thu, Oct 2nd)

I have been writing about the “.well-known” directory a few times before. Recently, about attackers hiding webshells &#;x26;#;x5b;1&#;x26;#;x5d;, and before that, about the purpose of the directory and why you should set up a “/.well-known/security.txt” file. But I noticed something else when I looked at today&#;x26;#;39;s logs on this web server. Sometimes you do not need a honeypot. Some attackers are noisy enough to be easily visible on a busy web server. This time, the attacker hit various URLs inside the “.well-known” directory. Here is a sample from the > 100 URLs hit:

Continue reading More .well-known Scans, (Thu, Oct 2nd)

Posted in Uncategorized

“user=admin”. Sometimes you don’t even need to log in., (Tue, Sep 30th)

One of the common infosec jokes is that sometimes, you do not need to “break” an application, but you have to log in. This is often the case for weak default passwords, which are common in IoT devices. However, an even easier method is to tell the application who you are. This does not even require a password&#;x26;#;x21; One of the sad recurring vulnerabilities is an HTTP cookie that contains the user&#;x26;#;39;s username or userid.

Continue reading “user=admin”. Sometimes you don’t even need to log in., (Tue, Sep 30th)

Posted in Uncategorized