Skip to content

carson0321/threatsonar-vulnerability

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

ThreatSonar Vulnerability PoC

ThreatSonar is a threat forensics and analysis platform developed by TeamT5, designed for proactive threat hunting and APT defense. This repository contains Proof-of-Concept (PoC) research for publicly disclosed vulnerabilities affecting ThreatSonar. All content does not reveal internal implementation details, and only the exploit is disclosed. All vulnerabilities were independently discovered and responsibly reported by Carson Wang.


CVE List

CVE ID CVSS Type Description
CVE-2026-5967 8.8 OS Command Injection (CWE-78) Authenticated remote attackers with shell access can inject OS commands and execute them with root privileges.
CVE-2026-5966 8.1 Path Traversal / Arbitrary File Deletion (CWE-23) Authenticated remote attackers with web access can exploit Path Traversal to delete arbitrary files on the system.
CVE-2025-7145 7.2 OS Command Injection (CWE-78) Attackers with intermediate platform privileges can inject arbitrary OS commands and execute them on the server, gaining administrative access.
CVE-2025-4477 7.2 Privilege Escalation / Missing Authorization (CWE-862) Attackers with intermediate privileges can escalate to the highest administrator level through a specific API.
CVE-2024-7694 7.2 Unrestricted File Upload (CWE-434) Administrators can upload malicious files to execute arbitrary system commands on the server.

Vulnerability Disclosure Policy

This project follows the principles of Responsible Disclosure:

  1. All vulnerabilities were reported to the vendor prior to publication and were disclosed only after a patch was released or the disclosure deadline had passed.
  2. PoCs are provided solely for security research, education, and defensive purposes.

Disclaimer

Warning: All content in this repository is intended solely for lawful, authorized security research and educational purposes.

  • All PoCs, code, and technical documentation in this repository are strictly prohibited from use in any unauthorized system access, disruption, data theft, or other illegal activity.
  • Users assume full legal responsibility for any use of the content in this repository. The author and contributors accept no liability for any direct or indirect damages arising from such use.
  • All content is provided "as is" without warranty of any kind, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or non-infringement.
  • Unauthorized access to or testing of computer systems is a criminal offense in many jurisdictions. Ensure you have obtained proper written authorization before using any material from this repository.

By using this repository, you acknowledge that you have read and agreed to this disclaimer.


CVE-2026-5967

CVSS: 8.8 | CWE: 78 | NVD: CVE-2026-5967


CVE-2026-5966

CVSS: 8.1 | CWE: 23 | NVD: CVE-2026-5966


CVE-2025-7145

CVSS: 7.2 | CWE: 78 | NVD: CVE-2025-7145


CVE-2025-4477

CVSS: 7.2 | CWE: 862 | NVD: CVE-2025-4477


CVE-2024-7694

CVSS: 7.2 | CWE: 434 | NVD: CVE-2024-7694


License

This project is licensed under the MIT License.

About

PoC

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors