Skip to content

CVE-2025-61932 - Lanscope Endpoint Manager - Remote Code Execution 💰 #13724

@princechaddha

Description

@princechaddha
Member

Description:

Lanscope Endpoint Manager (On-Premises) contains a remote code execution vulnerability caused by improper verification of the origin of incoming requests, letting attackers execute arbitrary code remotely, exploit requires sending specially crafted packets.

Severity: Critical

POC:

KEV: True

Shodan Query: NA

Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors are required to provide debug data(-debug) along with the template to help the triage team with validation or can also share a vulnerable environment like docker file.

Rewards will only be given once the template is fully validated by the team. Templates that are incomplete or invalid will not be accepted. Avoid adding code templates for CVEs that can be achieved using HTTP, TCP, or JavaScript. Such templates are blocked by default and won’t produce results, so we prioritize creating templates with other protocols unless exceptions are made.

You can check the FAQ for the Nuclei Templates Community Rewards Program here.

Activity

princechaddha

princechaddha commented on Oct 27, 2025

@princechaddha
MemberAuthor

/bounty $100

algora-pbc

algora-pbc commented on Oct 27, 2025

@algora-pbc

💎 $100 bounty • ProjectDiscovery Bounty Available for CVE Template Contribution

Steps to Contribute:

  • Claim attempt: Comment /attempt #13724 on this issue to claim attempt. Multiple participants can attempt, but only the first to submit a complete POC template along with full debug data will receive the reward similar to bug bounty programs.
  • Write the Template: Create a high-quality Nuclei template for the specified CVE, following our Contribution Guidelines and Acceptance Criteria.
  • Submit the Template: Open a pull request (PR) to projectdiscovery/nuclei-templates and include /claim #13724 in the PR body to claim the bounty.
  • Receive Payment: Upon successful merge of your PR, you will receive 100% of the bounty through Algora.io within 2-5 days. Ensure you are eligible for payouts.

Thank you for contributing to projectdiscovery/nuclei-templates and helping us democratize security!

Acceptance Criteria: The template must include a complete POC and should not rely solely on version-based detection. Contributors must share vulnerable setup information or a testable instance by emailing templates@projectdiscovery.io. Providing a testable instance significantly reduces validation time and increases the chance of quicker rewards. Templates that are incomplete, invalid, or non-verifiable will not be accepted. Avoid submitting code templates for CVEs that can be detected using HTTP, TCP, or JavaScript only these are blocked by default and will not produce results. Exceptions may apply for certain cases. Do not submit AI-simulated vulnerable environments. To qualify for the bounty, the team must be able to fully validate the POC. If you have hosted a vulnerable environment for validation, send the details (IP or Docker setup) along with the PR number to templates[at]projectdiscovery.io

You can check the FAQ for the Nuclei Templates Community Rewards Program here.

Add a bountyShare on socials

Attempt Started (UTC) Solution Actions
🟢 @kris70lesgo Nov 06, 2025, 07:14:24 AM WIP
🟢 @Bot-GJ16 Nov 09, 2025, 08:09:11 AM #13875 Reward
🟢 @intelligent-ears Nov 10, 2025, 01:36:53 AM #13878 Reward
🟢 @nikhilpatidar01 Nov 11, 2025, 06:09:51 PM WIP
🟢 @utsab345 Oct 27, 2025, 12:23:44 PM WIP
🟢 @Pranjal6955 Oct 28, 2025, 09:45:55 AM WIP
🟢 @naaa760 Oct 28, 2025, 02:07:25 PM WIP
Pranjal6955

Pranjal6955 commented on Oct 28, 2025

@Pranjal6955
Contributor

/attempt #13724

kris70lesgo

kris70lesgo commented on Nov 6, 2025

@kris70lesgo

/attempt #13724

Bot-GJ16

Bot-GJ16 commented on Nov 9, 2025

@Bot-GJ16

/attempt #13724

intelligent-ears

intelligent-ears commented on Nov 10, 2025

@intelligent-ears
Contributor

/attempt #13724

nikhilpatidar01

nikhilpatidar01 commented on Nov 12, 2025

@nikhilpatidar01

/attempt #13724

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

    Development

    No branches or pull requests

      Participants

      @princechaddha@ritikchaddha@kris70lesgo@Bot-GJ16@nikhilpatidar01

      Issue actions

        CVE-2025-61932 - Lanscope Endpoint Manager - Remote Code Execution 💰 · Issue #13724 · projectdiscovery/nuclei-templates