██████   ███████   █████    ██████  ████████  ██████    ███████  ██   ██  ███████  ██       ██       
 ██   ██  ██       ██   ██  ██           ██         ██   ██       ██   ██  ██       ██       ██       
 ██████   █████    ███████  ██           ██     █████    ███████  ███████  █████    ██       ██       
 ██   ██  ██       ██   ██  ██           ██    ██             ██  ██   ██  ██       ██       ██       
 ██   ██  ███████  ██   ██   ██████      ██    ███████   ███████  ██   ██  ███████  ███████  ███████  
 █ █ █ █  █ █ █ █  █ █ █ █   █ █ █       █     █ █ █ █   █ █ █ █  █ █ █ █  █ █ █ █  █ █ █ █  █ █ █ █  
 █   █      █      █   █     █                 █         █        █   █      █         █   █        
     █           █         █                               █                        █               

Proof-of-concept exploit scanner for CVE-2025-55182

Python Exploit Dev CVE-2025-55182
← Return to Projects
soraf@kali:~/tools/React2Shell$ python exploit.py -f targets.txt
[+] Loading 45 targets from targets.txt...
[+] Initializing React2Shell Scanner for CVE-2025-55182

[~] Scanning in progress (silent mode)...

[VULNERABLE] https://api.vulnerable-target.com
whoami: www-data
uid=33(www-data) gid=33(www-data) groups=33(www-data)

[VULNERABLE] https://old-deployment.internal.net
whoami: root
root:x:0:0:root:/root:/bin/bash

[✓] Scan complete. Found 2 vulnerable targets out of 45.

01. The Objective

When a critical zero-day affects widespread architecture, quickly determining exposure within massive attack surfaces is extremely difficult. I built React2Shell to automate the discovery and safe exploitation of CVE-2025-55182 (React Server Components RCE). It enables security researchers to definitively test targets simply and silently.

02. Technical Architecture

Written strictly in Python using high-concurrency request engineering, React2Shell processes multiple target strings systematically. It parses local files and standardizes schemas. Rather than complex UI, it runs an interactive shell or executes chained commands (like `whoami`, `cat /etc/passwd`, and `ls -la /var/www`) by leveraging specific serialization bypass payloads unique to the vulnerability.

Detection Engine

Python automated scanner focusing on React Server Components specific RCE vectors.

Target Vectors

Unpatched Webpack/React bundling endpoints suffering from CVE-2025-55182.

Reporting

Real-time silent execution. Only confirms output on successful remote command execution.

03. Challenges & Solutions

The major technical obstacle was minimizing the noise and network traffic generated during multi-target scanning across hundreds of domains. I implemented a strict silent-failure model and dynamic payload injection. Instead of outputting 404s and normal errors, the script simply shows an initialization spinner and only returns a console block when an active, working shell returns a positive validation of the underlying RCE vulnerability.

View Repository