Metasploit Wrap-Up 11/07/2025
rapid7.com·9h
Flag this post

New module content (3)

Centreon authenticated command injection leading to RCE via broker engine “reload” parameter

Type: Exploit

Path: linux/http/centreon_auth_rce_cve_2025_5946

Description: Adds an exploit module for Centreon. The vulnerability, an authenticated command injection, will lead to a remote code execution.

Rootkit Privilege Escalation Signal Hunter

Type: Exploit

Path: linux/local/rootkit_privesc_signal_hunter

Description: Expands diamorphine privilege escalation module to other rootkits that use signal handling for privilege escalation.

Windows Persistent Task Scheduler

Author: h00die

Type: Exploit

Path: windows/persistence/task_scheduler

Description: This adds a new persistence module for Windows - the task scheduler module. The mod…

Similar Posts

Loading similar posts...