Site icon API Security Blog

Exploit for CVE-2025-31125

image
πŸ” Vite/Vue JS Exploitation Toolkit This toolkit contains two Python scripts for identifying and exploiting Laravel applications with exposed .env files and vulnerable APP_KEYs. Screenshots Grabber Screenshots Exploit 🧾 Script 1: main.py πŸ“Œ Purpose: Finds exposed Vite dev servers on the internet using advanced Shodan queries, with support for country and custom filtering. Also provides domain/IP conversion utilities for pentesters and bug bounty researchers. πŸ›  How It Works: – Uses a wide set of Vite fingerprinting queries to search Shodan. – Supports country code and custom Shodan filter input. – Saves hostnames and IPs in organized, timestamped folders. – Converts domain lists to IPs. – Performs reverse IP lookups (IP to domain). πŸ“₯ Usage: 1. Prepare your Shodan API key and edit the script to insert it. Run the script: python main.py Choose an option: Grab Hostname/Domain from Shodan (with filters) Domain to IP IP to Domain (Reverse IP) Follow the prompts for input files and filters. πŸ“ Output: – Shodan results saved in: ResultGrabVite/[COUNTRY]/ResultHost_YYYYMMDD-HHMMSS.txt ResultGrabVite/[COUNTRY]/ResultIP_YYYYMMDD-HHMMSS.txt – Domain to IP results: ResultDomainToIPVite/DomainToIP_YYYYMMDD-HHMMSS.txt – IP to Domain results: ResultIPToDomainVite/IPToDomain_YYYYMMDD-HHMMSS.txt πŸ“¦ Dependencies: – shodan – colorama – requests Install with: pip install -r requirements.txt 🧾 Script 2: vue.py πŸ“Œ Purpose: Exploits Vite CVE-2025-31125 to read sensitive files…Read More

Exit mobile version