ThreatSonar is a threat forensics and analysis platform developed by TeamT5, designed for proactive threat hunting and APT defense. This repository contains Proof-of-Concept (PoC) research for publicly disclosed vulnerabilities affecting ThreatSonar. All content does not reveal internal implementation details, and only the exploit is disclosed. All vulnerabilities were independently discovered and responsibly reported by Carson Wang.
| CVE ID | CVSS | Type | Description |
|---|---|---|---|
| CVE-2026-5967 | 8.8 | OS Command Injection (CWE-78) | Authenticated remote attackers with shell access can inject OS commands and execute them with root privileges. |
| CVE-2026-5966 | 8.1 | Path Traversal / Arbitrary File Deletion (CWE-23) | Authenticated remote attackers with web access can exploit Path Traversal to delete arbitrary files on the system. |
| CVE-2025-7145 | 7.2 | OS Command Injection (CWE-78) | Attackers with intermediate platform privileges can inject arbitrary OS commands and execute them on the server, gaining administrative access. |
| CVE-2025-4477 | 7.2 | Privilege Escalation / Missing Authorization (CWE-862) | Attackers with intermediate privileges can escalate to the highest administrator level through a specific API. |
| CVE-2024-7694 | 7.2 | Unrestricted File Upload (CWE-434) | Administrators can upload malicious files to execute arbitrary system commands on the server. |
This project follows the principles of Responsible Disclosure:
- All vulnerabilities were reported to the vendor prior to publication and were disclosed only after a patch was released or the disclosure deadline had passed.
- PoCs are provided solely for security research, education, and defensive purposes.
Warning: All content in this repository is intended solely for lawful, authorized security research and educational purposes.
- All PoCs, code, and technical documentation in this repository are strictly prohibited from use in any unauthorized system access, disruption, data theft, or other illegal activity.
- Users assume full legal responsibility for any use of the content in this repository. The author and contributors accept no liability for any direct or indirect damages arising from such use.
- All content is provided "as is" without warranty of any kind, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or non-infringement.
- Unauthorized access to or testing of computer systems is a criminal offense in many jurisdictions. Ensure you have obtained proper written authorization before using any material from this repository.
By using this repository, you acknowledge that you have read and agreed to this disclaimer.
CVSS: 8.8 | CWE: 78 | NVD: CVE-2026-5967
CVSS: 8.1 | CWE: 23 | NVD: CVE-2026-5966
CVSS: 7.2 | CWE: 78 | NVD: CVE-2025-7145
CVSS: 7.2 | CWE: 862 | NVD: CVE-2025-4477
CVSS: 7.2 | CWE: 434 | NVD: CVE-2024-7694
This project is licensed under the MIT License.