nomisec
WORKING POC
31 stars
by BridgerAlderson · poc
https://github.com/BridgerAlderson/CVE-2025-27591-PoC
This PoC exploits a privilege escalation vulnerability (CVE-2025-27591) in the Below service by manipulating a world-writable directory to create a symlink attack, allowing an attacker to append a malicious entry to /etc/passwd and gain root access.
Classification
Working Poc 95%
Target:
Below service before version 0.9.0
No auth needed
Prerequisites:
World-writable /var/log/below directory · Presence of the Below service binary · Ability to execute commands as a local user
nomisec
WORKING POC
16 stars
by 0x00Jeff · poc
https://github.com/0x00Jeff/CVE-2025-27591
This exploit leverages a world-writable log file vulnerability in 'below' versions < v0.9.0 to create a symlink to /etc/ld.so.preload, enabling arbitrary shared library injection for local privilege escalation (LPE). The PoC includes a reverse shell payload and cleanup routines to cover tracks.
Classification
Working Poc 95%
Target:
below < v0.9.0
No auth needed
Prerequisites:
Target system must have 'below' installed with vulnerable permissions · Attacker must have local access to execute scripts
nomisec
WORKING POC
13 stars
by obamalaolu · poc
https://github.com/obamalaolu/CVE-2025-27591
This exploit leverages a symlink attack on the 'below' monitoring tool to overwrite /etc/passwd, injecting a malicious root user for privilege escalation. It requires sudo access to 'below' and exploits world-writable log directories.
Classification
Working Poc 95%
Target:
below (prior to v0.9.0)
Auth required
Prerequisites:
sudo access to /usr/bin/below · world-writable /var/log/below/error_root.log
nomisec
WORKING POC
8 stars
by dollarboysushil · poc
https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591
This repository contains a functional privilege escalation exploit for CVE-2025-27591, targeting the `below` system monitoring tool. The exploit leverages a world-writable log directory to create a symlink attack, allowing an attacker to overwrite `/etc/passwd` and gain root access.
Classification
Working Poc 95%
Target:
below < v0.9.0
Auth required
Prerequisites:
World-writable `/var/log/below` directory · Ability to run `sudo /usr/bin/below record`
nomisec
WORKING POC
3 stars
by rvizx · poc
https://github.com/rvizx/CVE-2025-27591
This exploit leverages a world-writable log directory in Below <= v0.8.1 to create a symlink to /etc/passwd, which is then modified to add a root-privileged user when Below is executed with sudo.
Classification
Working Poc 100%
Target:
Below <= v0.8.1
Auth required
Prerequisites:
User in sudo group with NOPASSWD access to /usr/bin/below · Below <= v0.8.1 installed
nomisec
WORKING POC
3 stars
by Cythonic1 · poc
https://github.com/Cythonic1/CVE-2025-27591
This exploit leverages a world-writable log file in the 'below' tool to create a symlink to /etc/passwd, allowing an attacker to inject a new root user entry via crafted input. It requires sudo access to execute the 'below' command.
Classification
Working Poc 95%
Target:
below (version not specified)
Auth required
Prerequisites:
sudo access to execute 'below' · world-writable log file at /var/log/below/error_root.log
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-27591
The repository contains functional exploit code for multiple CVEs, including authentication bypass vulnerabilities in TOTOLINK devices and a scanner for Fortinet SSL VPN (CVE-2024-21762). The PoCs demonstrate the vulnerabilities with clear technical details and executable scripts.
Classification
Working Poc 90%
Target:
TOTOLINK LR350, TOTOLINK T6, Fortinet SSL VPN
No auth needed
Prerequisites:
network access to the target device
nomisec
WORKING POC
2 stars
by VisaiCyber · poc
https://github.com/VisaiCyber/CVE-2025-27591-below-
This exploit leverages a symlink attack in Below's world-writable log directory to overwrite /etc/passwd, enabling privilege escalation to root. The PoC script automates the creation of a malicious user entry and triggers the vulnerability via sudo access to 'below'.
Classification
Working Poc 95%
Target:
Below v0.9.0 and prior
Auth required
Prerequisites:
sudo access to /usr/bin/below · world-writable /var/log/below directory
github
WORKING POC
2 stars
by Diabl0xE · shellpoc
https://github.com/Diabl0xE/CVE-2025-27519
The repository contains a functional Bash script that exploits a local privilege escalation vulnerability (CVE-2025-27519) in the 'below' logging utility. The exploit abuses a world-writable log directory to create a symlink from a log file to /etc/passwd, allowing an attacker to insert a fake root user entry.
Classification
Working Poc 95%
Target:
below logging utility (version not specified)
Auth required
Prerequisites:
Local access to the system · Presence of the vulnerable 'below' binary · World-writable /var/log/below/ directory
nomisec
WORKING POC
2 stars
by 00xCanelo · poc
https://github.com/00xCanelo/CVE-2025-27591
This repository contains a functional privilege escalation exploit for CVE-2025-27591, targeting the 'below' performance monitoring tool. The exploit abuses a world-writable log directory via symlink manipulation to append a malicious entry to /etc/passwd, enabling root access.
Classification
Working Poc 95%
Target:
below (versions prior to patched release)
Auth required
Prerequisites:
Bash shell · Vulnerable 'below' binary installed · World-writable /var/log/below directory · sudo privileges to execute 'below record'
nomisec
WORKING POC
2 stars
by incommatose · poc
https://github.com/incommatose/CVE-2025-27591-PoC
This PoC exploits a symlink attack in Below < v0.9.0, where a world-writable /var/log/below directory allows unprivileged users to overwrite /etc/passwd via a symlink, escalating privileges to root.
Classification
Working Poc 100%
Target:
Below < v0.9.0
Auth required
Prerequisites:
/var/log/below/ must be world-writable · sudo access to /usr/bin/below
nomisec
WORKING POC
1 stars
by nikolas-trey · poc
https://github.com/nikolas-trey/CVE-2025-27591
This repository contains a functional privilege escalation exploit for CVE-2025-27591, leveraging a world-writable directory symlink attack to manipulate /etc/passwd and escalate to root. The exploit script automates the creation of a symlink and triggers the vulnerable service to write to the targeted file.
Classification
Working Poc 95%
Target:
Below service <v0.9.0
No auth needed
Prerequisites:
local access · world-writable /var/log/below directory
nomisec
WORKING POC
1 stars
by 0xDTC · poc
https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591
This is a Bash-based privilege escalation exploit for CVE-2025-27591, targeting a symlink vulnerability in the 'below' system performance monitoring tool. It automates the creation of a root user in /etc/passwd by leveraging world-writable log directories.
Classification
Working Poc 95%
Target:
Facebook's 'below' system performance monitor (versions with world-writable log directories)
Auth required
Prerequisites:
Target system running vulnerable 'below' binary · World-writable /var/log/below directory · User must have sudo access to execute 'below record'
nomisec
WORKING POC
1 stars
by danil-koltsov · poc
https://github.com/danil-koltsov/below-log-race-poc
This is a functional privilege escalation exploit for CVE-2025-27591, targeting a race condition in the 'below' utility's log file handling. It abuses symlink manipulation to inject a malicious user into /etc/passwd, granting root access.
Classification
Working Poc 95%
Target:
below utility (version unspecified)
Auth required
Prerequisites:
unprivileged user access · below utility installed · write access to /var/log/below/ · sudo access to run 'below'
nomisec
WORKING POC
1 stars
by umutatalar · poc
https://github.com/umutatalar/CVE-2025-27591
This repository contains a functional privilege escalation exploit for CVE-2025-27591, leveraging a world-writable directory symlink attack to manipulate /etc/passwd. The exploit creates a symlink in /var/log/below and triggers a log write via the 'below' service to escalate privileges.
Classification
Working Poc 95%
Target:
Below service <v0.9.0
No auth needed
Prerequisites:
local access · world-writable /var/log/below directory
nomisec
WORKING POC
1 stars
by umutcamliyurt · poc
https://github.com/umutcamliyurt/CVE-2025-27591
This exploit leverages a world-writable directory vulnerability in the Below service (<v0.9.0) to perform a symlink attack, allowing local privilege escalation by manipulating /etc/passwd to add a root-level user.
Classification
Working Poc 95%
Target:
Below service <v0.9.0
No auth needed
Prerequisites:
Local access to the system · Below service installed and running with vulnerable version
nomisec
WORKING POC
by rippsec · poc
https://github.com/rippsec/CVE-2025-27591-Meta-below-LPE
The repository contains a functional exploit for CVE-2025-27591, a symlink-based local privilege escalation vulnerability in Meta's 'below' system resource monitor. The exploit leverages improper symlink handling in the logging mechanism to overwrite arbitrary files as root, demonstrated by modifying /etc/passwd to gain root access.
Classification
Working Poc 100%
Target:
Meta below < 0.9.0
Auth required
Prerequisites:
Local user with sudo access to /usr/bin/below · Meta below version < 0.9.0 installed
nomisec
WORKING POC
by Stp1t · poc
https://github.com/Stp1t/CVE-2025-27591
This exploit leverages a symlink attack to manipulate file permissions of /etc/passwd, allowing an unprivileged user to escalate privileges by removing the root password. It targets a world-writable directory and a service that incorrectly handles file permissions.
Classification
Working Poc 95%
Target:
Service Below < 0.9.0
No auth needed
Prerequisites:
Service Below < 0.9.0 installed · World-writable /var/log/below directory · Ability to execute the 'below' binary
nomisec
WORKING POC
by Thekin-ctrl · poc
https://github.com/Thekin-ctrl/CVE-2025-27591-Below
This PoC exploits a symlink attack in the 'below' system monitor tool (CVE-2025-27591) to inject a malicious user into /etc/passwd, enabling local privilege escalation to root. The exploit creates a symlink from a log file to /etc/passwd, triggers the vulnerable service, and appends a root-level user entry.
Classification
Working Poc 95%
Target:
below system monitor tool (version unspecified)
Auth required
Prerequisites:
sudo access to run '/usr/bin/below record' · write access to /var/log/below directory
nomisec
WORKING POC
by alialucas7 · poc
https://github.com/alialucas7/CVE-2025-27591_PoC
This PoC exploits CVE-2025-27591 by leveraging a symlink attack on a world-writable log directory to append a malicious line to /etc/passwd, granting root access via a new user. The exploit requires local access and sudo privileges to execute 'below record'.
Classification
Working Poc 95%
Target:
below (version not specified, likely pre-commit da9382e6e3e332fd2c3195e22f34977f83f0f1f3)
Auth required
Prerequisites:
Local access to the target machine · Sudo privileges to execute 'below record' · World-writable /var/log/below directory
nomisec
WORKING POC
by DarksBlackSk · poc
https://github.com/DarksBlackSk/CVE-2025-27591
This PoC exploits a local privilege escalation vulnerability in Below < v0.9.0 by leveraging a symlink attack on a world-writable log directory to overwrite /etc/passwd and gain root access.
Classification
Working Poc 95%
Target:
Below < v0.9.0
Auth required
Prerequisites:
Below < v0.9.0 installed · Local user access · Ability to execute 'below' as root (e.g., via sudo)