Nuclei POC 精选分析 - 2026-02-14

Nuclei POC 精选分析 - 2026-02-14

📊 智能筛选概况

  • 发现变更: 302 个模板更新
  • 精选分析: 7 个高价值 POC
  • 智能跳过: 295 个低优先级模板
  • 高风险漏洞: 7 个
  • 主要类别: CVE漏洞(7)

💡 智能筛选说明: 系统自动优先分析 CVE 漏洞、高危漏洞和新增模板,跳过低价值的技术识别类模板,确保高效利用 API 资源。

严重程度分布

  • 🔴 严重: 7 个

🔍 重点漏洞分析

GitLab - SAML Authentication Bypass

  • 漏洞ID: CVE-2025-25291
  • CVE: CVE-2025-25291 (2025)
  • 严重程度: 🔴 CRITICAL
  • 风险等级: 极高风险 (5/5)
  • 影响资产: GitLab 平台
  • 预估影响: 数千个
  • EPSS: 0.13848 (percentile 0.94131) @ 2026-02-13

描述: ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.

攻击向量: 网络扫描

CVE编号: CVE-2025-25291

参考链接:


Erlang/OTP SSH - Remote Code Execution

  • 漏洞ID: CVE-2025-32433
  • CVE: CVE-2025-32433 (2025)
  • 严重程度: 🔴 CRITICAL
  • 风险等级: 极高风险 (5/5)
  • 影响资产: 未知
  • 预估影响: 数千个
  • EPSS: 0.49906 (percentile 0.97734) @ 2026-02-13

描述: Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials.

攻击向量: 网络扫描

CVE编号: CVE-2025-32433

参考链接:


RustFS < 1.0.0-alpha.77 - Hardcoded gRPC Authentication Token

  • 漏洞ID: CVE-2025-68926
  • CVE: CVE-2025-68926 (2025)
  • 严重程度: 🔴 CRITICAL
  • 风险等级: 极高风险 (5/5)
  • 影响资产: 未知
  • 预估影响: 数千个
  • EPSS: 0.09474 (percentile 0.92637) @ 2026-02-13

描述: RustFS before 1.0.0-alpha.77 used a hardcoded gRPC authentication token "rustfs rpc" that could not be changed without recompiling and this allowed unauthenticated remote attackers to gain full administrative access to the gRPC API.

攻击向量: 网络扫描

CVE编号: CVE-2025-68926

参考链接:


WatchGuard IKEv2 Out-of-Bounds Write Vulnerability

  • 漏洞ID: CVE-2025-9242
  • CVE: CVE-2025-9242 (2025)
  • 严重程度: 🔴 CRITICAL
  • 风险等级: 极高风险 (5/5)
  • 影响资产: 未知
  • 预估影响: 数千个
  • EPSS: 0.66535 (percentile 0.98491) @ 2026-02-13

描述: WatchGuard Fireware OS 11.10.2 to 11.12.4_Update1, 12.0 to 12.11.3, and 2025.1 contains an out-of-bounds write caused by improper handling in Mobile User VPN and Branch Office VPN with IKEv2 dynamic gateway peer, letting remote unauthenticated attackers execute arbitrary code.

攻击向量: 网络扫描

CVE编号: CVE-2025-9242

参考链接:


GNU Inetutils telnetd - Authentication Bypass

  • 漏洞ID: CVE-2026-24061
  • CVE: CVE-2026-24061 (2026)
  • 严重程度: 🔴 CRITICAL
  • 风险等级: 极高风险 (5/5)
  • 影响资产: 未知
  • 预估影响: 数千个
  • EPSS: 0.8389 (percentile 0.9927) @ 2026-02-13

描述: GNU Inetutils telnetd through 2.7 contains an authentication bypass caused by setting the USER environment variable to &quot;-f root&quot;, letting remote attackers bypass authentication, exploit requires remote access to telnetd service.

攻击向量: 网络扫描

CVE编号: CVE-2026-24061

参考链接:


Landray EIS SQL注入漏洞

  • 漏洞ID: CVE-2025-22214
  • CVE: CVE-2025-22214 (2025)
  • 严重程度: 🔴 CRITICAL
  • 风险等级: 极高风险 (5/5)
  • 影响资产: 未知
  • 预估影响: 数千个
  • EPSS: 0.00151 (percentile 0.35746) @ 2026-02-13

描述: Landray EIS 2001 through 2006 contains a SQL injection caused by unsanitized input in Message/fi_message_receiver.aspx?replyid=, letting attackers execute arbitrary SQL commands, exploit requires crafted input.

攻击向量: 网络扫描

参考链接:


BeyondTrust Remote Support - Unauthenticated WebSocket RCE

  • 漏洞ID: CVE-2026-1731
  • CVE: CVE-2026-1731 (2026)
  • 严重程度: 🔴 CRITICAL
  • 风险等级: 极高风险 (5/5)
  • 影响资产: 未知
  • 预估影响: 数千个
  • EPSS: 0.04222 (percentile 0.88503) @ 2026-02-13

描述: BeyondTrust Remote Support is vulnerable to unauthenticated remote code execution via the WebSocket endpoint /nw. An attacker can extract the company identifier from the /get_mech_list endpoint and use it to connect to the WebSocket service, then inject OS commands through the binary WebSocket payload that are executed on the server.

攻击向量: 网络扫描

CVE编号: CVE-2026-1731

参考链接:


📋 完整模板列表

模板名称严重程度类别影响资产EPSS风险评分
GitLab - SAML Authentication Bypass🔴 criticalCVE漏洞GitLab 平台0.13855/5
Erlang/OTP SSH - Remote Code Execution🔴 criticalCVE漏洞通用0.49915/5
RustFS < 1.0.0-alpha.77 - Hardcoded gRPC Authen🔴 criticalCVE漏洞通用0.09475/5
WatchGuard IKEv2 Out-of-Bounds Write Vulnerability🔴 criticalCVE漏洞通用0.66535/5
GNU Inetutils telnetd - Authentication Bypass🔴 criticalCVE漏洞通用0.83895/5
Landray EIS SQL注入漏洞🔴 criticalCVE漏洞通用0.00155/5
BeyondTrust Remote Support - Unauthenticated WebSo🔴 criticalCVE漏洞通用0.04225/5

🛡️ 安全建议

🚨 发现高风险漏洞,建议立即扫描相关资产 🔍 关注新发布的 CVE 漏洞,及时更新补丁 ⚡ 检测到远程代码执行漏洞,优先处理

🔧 扫描建议

建议使用以下 Nuclei 命令进行扫描:

# 扫描高危漏洞
nuclei -t code/cves/2025/CVE-2025-25291.yaml -t code/cves/2025/CVE-2025-32433.yaml -t code/cves/2025/CVE-2025-68926.yaml -t code/cves/2025/CVE-2025-9242.yaml -t code/cves/2026/CVE-2026-24061.yaml -t http/cves/2025/CVE-2025-22214.yaml -t javascript/cves/2026/CVE-2026-1731.yaml -u target-url

# 扫描所有今日新增模板  
nuclei -t code/cves/2025/CVE-2025-25291.yaml -t code/cves/2025/CVE-2025-32433.yaml -t code/cves/2025/CVE-2025-68926.yaml -t code/cves/2025/CVE-2025-9242.yaml -t code/cves/2026/CVE-2026-24061.yaml -t http/cves/2025/CVE-2025-22214.yaml -t javascript/cves/2026/CVE-2026-1731.yaml -u target-url

本报告基于 Nuclei 模板库自动生成,数据来源:ProjectDiscovery/nuclei-templates

扫描建议仅供参考,请在授权环境下进行安全测试