's Avatar

@theyhack.bsky.social

infosec | security research: https://theyhack.me/cve/ Opinions are mine.

11 Followers  |  70 Following  |  21 Posts  |  Joined: 04.12.2024  |  1.8547

Latest posts by theyhack.bsky.social on Bluesky


If iOS was a car, notifications would pop up in front of your brake pedal and steering wheel.

22.02.2026 18:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
CVE-2025-67736 FreePBX Authenticated SQL Injection leads to RCE Overview This will be fairly straight to the point since it’s another FreePBX vulnerability. It’s an authenticated SQLi, so not the end of the world as you’d need admin access, but it was a cool way t...

New blog post out on an authenticated SQLi I found and reported in FreePBX a couple months ago:

theyhack.me/CVE-2025-677...

07.02.2026 19:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

πŸ’―

28.01.2026 16:46 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

My team confirmed that recently disclosed Arista NGFW vulnerabilities are fully exploitable! RCE is possible with victim interaction. More details coming soon to our blog: bishopfox.com/blog

04.12.2025 11:48 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

We now have a (draft) @metasploit-r7.bsky.social exploit module for the recent Fortinet FortiWeb vulns, chaining CVE-2025-64446 (auth bypass) + CVE-2025-58034 (command injection) to achieve unauthenticated RCE with root privileges: github.com/rapid7/metas...

21.11.2025 13:29 β€” πŸ‘ 20    πŸ” 10    πŸ’¬ 1    πŸ“Œ 0
CVE-2025-64328 FreePBX Authenticated Command Injection Overview

Blog post for CVE-2025-64328 FreePBX Authenticated Command Injection has been released. It includes a nuclei template for detection.

theyhack.me/CVE-2025-643...

09.11.2025 00:29 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I have a close friend who spent the last 15 years as an ETL developer and whose department was recently laid off (jobs were outsourced). If anyone has or knows of any openings, this guy is intelligent, personable, and overall a great person, and I'd love to put you in touch.

Reposts appreciated!

12.08.2025 01:55 β€” πŸ‘ 0    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0

πŸ“£THREAD: It’s surprising to me that so many people were surprised to learn that Signal runs partly on AWS (something we can do because we use encryption to make sure no one but you–not AWS, not Signal, not anyone–can access your comms).

It’s also concerning. 1/

27.10.2025 10:38 β€” πŸ‘ 2874    πŸ” 1060    πŸ’¬ 43    πŸ“Œ 182
Post image

πŸ“’ Confirmed! Sina Kheirkhah and McCaulay Hudson of Summoning Team used a pair of bugs to exploit of the Synology ActiveProtect Appliance DP320. That rounds their day off with another $50,000 and 5 more Master of Pwn points. (And clean that screen!) #Pwn2Own

21.10.2025 16:21 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
CVE-2025-34227 - Nagios XI Authenticated Command Injection in Configuration Wizard MySQL and PostgreSQL monitoring services leads to Remote Code Execution Overview

I released the details of CVE-2025-34227, an authenticated command injection vulnerability I discovered and reported in Nagios XI.

theyhack.me/CVE-2025-342...

15.10.2025 03:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

has anyone ever actually got any useful information from a company's "service status" page? I don't think I've ever once went to the page and found something degraded/offline when I was experiencing an issue, only to find someone on reddit/hackernews posted the same issue...

04.10.2025 14:50 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
When Audits Fail: Four Critical Pre-Auth Vulnerabilities in TRUfusion Enterprise | RCE Security

Another day, another Remote Code Execution (and its 3 friends).

Pre-auth path traversal, hard-coded crypto key allowing cookie forgery, arbitrary file write, and PII disclosure in TRUfusion Enterprise (CVE-2025-27222 to CVE-2025-27225) #security

www.rcesecurity.com/2025/09/when...

30.09.2025 15:43 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0

a5784ebd34c7f5117f7c846d1b31bcbdb1061b609327753613b49c341c1ab30b

07.09.2025 03:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
NVD - CVE-2024-13986

CVE-2024-13986 has been assigned to two vulnerabilities in Nagios XI I found and reported last year that result in Remote Code Exection:
nvd.nist.gov/vuln/detail/...

Blog post and exploit I released on them here:
theyhack.me/Nagios-XI-Au...

29.08.2025 17:13 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Yup.

24.07.2025 14:49 β€” πŸ‘ 36    πŸ” 7    πŸ’¬ 0    πŸ“Œ 4
Post image 10.07.2025 16:59 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

lol fr. I always see stuff like this in products and think of how hard companies try to make so much of tech seem like it's magic, and not just some HTTP request, probably to a spring boot API...

02.06.2025 17:28 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

At worst, EΜΆxΜΆcΜΆeΜΆl regex is the second best tool for the job.

27.05.2025 17:48 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

my favorite part of our med system is how a provider gets acquired/changes systems, and now I need to register on some new "portal" that was cloned from a random dashboard on github and rebranded, and then totally put all of my personal info in this one now.

20.05.2025 21:55 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Energy drinks linked to rise in colorectal and blood cancer | Hacker News

news.ycombinator.com/item?id=4401...

IANA anything to do with this field, but there is some decent discussion on this study here.

18.05.2025 16:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

That was a really fun read!

Heads up, I _think_ there are a couple typos in this line

> Just like that, we've seemingly replicated CVE-2025-4427 - but as always, we cant't help but wonder about t why this vulnerability works this way.

17.05.2025 03:08 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

That one line issue with XXE, I seem to remember coming across something when I had the same issue where a Java version change causes newlines to throw an exception vs older java would just send them. I _think_ it was version 11, but google is not cooperating today.

12.05.2025 13:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I'm convinced some applications' defense is simply to load as many external resources as possible to deter attackers from looking through requests in burp.

02.05.2025 16:14 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Safe.eth on X: "Investigation Updates and Community Call to Action" / X Investigation Updates and Community Call to Action

New details on the ByBit/Safe{Wallet} breach, and uhhh wow, some really silly blunders on the DPRK side. They still succeeded which is the most upsetting part of all of this. Let's bully some threat actor tradecraft! A🧡
x.com/safe/status/...

06.03.2025 17:21 β€” πŸ‘ 23    πŸ” 12    πŸ’¬ 1    πŸ“Œ 2

jinja2.exceptions.UndefinedError: 'randstr' is undefined πŸ‘€ πŸ˜…

04.03.2025 22:06 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It would be cool if with nuclei, you could select all templates that use a specific path. IE, if I could specify `~/nuclei-templates/http/exposed-panels/` and then run every template that is `{{baseURL}}` or every template that is `/admin` IE maximize matchers to requests ratio...

28.02.2025 21:51 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Yep.

Then I accidentally click one of the columns like `host` and it changes without me realizing it, then I go insane thinking burp is broken πŸ˜…

I kinda wish you could lock that somehow...

10.02.2025 14:02 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

My role was just eliminated.

03.02.2025 22:04 β€” πŸ‘ 30    πŸ” 4    πŸ’¬ 16    πŸ“Œ 1
Post image

Exciting news! I’ve been accepted to speak at #RSAC 2025! I’ll be presenting β€œCritiquing Cloud Criminals: Ready for Smarter Cloud Attacks?”. We’ll critique the tradecraft and techniques of real world threat actors! It’s like a Gordon Ramsay cooking show, minus the accent and swearing! See you in SF!

28.01.2025 21:14 β€” πŸ‘ 13    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

client side 2fa πŸ˜…

24.01.2025 16:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@theyhack is following 20 prominent accounts