{"uuid": "89ce417d-ae97-49fe-bcbc-bd40ad76b1e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-53772", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/86", "content": "# CVE-2025-53772-PoC\n\n\nCVE-2025-53772 ISS - Web Deploy Remote Code Execution Vulnerability Exploit\n\nNOTICE: This tool is provided for EDUCATIONAL PURPOSES and AUTHORIZED TESTING\n\nAttack Vector\nThis metric reflects the context by which vulnerability exploitation is possible. The Base Score increases the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable component.\n\nAttack Complexity\nThis metric describes the conditions beyond the attacker\u2019s control that must exist in order to exploit the vulnerability. Such conditions may require the collection of more information about the target or computational exceptions. The assessment of this metric excludes any requirements for user interaction in order to exploit the vulnerability. If a specific configuration is required for an attack to succeed, the Base metrics should be scored assuming the vulnerable component is in that configuration.", "creation_timestamp": "2025-09-27T23:35:12.000000Z"}