CrushFTP CVE-2025-31161 Auth Bypass and Post-Exploitation
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
A critical vulnerability (CVE-2025-31161) in CrushFTP managed file transfer software allows attackers to bypass authentication and gain admin-level access. Affecting versions 10.0.0-10.8.3 and 11.0.0-11.3.0, the flaw enables unauthorized actions, including data retrieval and administrative control. Exploitation has been observed since March 30, 2025, with ~1,500 vulnerable instances exposed. Post-exploitation activities include creating backdoor accounts, deploying MeshCentral agents, and using AnyDesk for remote access. A Telegram bot-based malware was also identified. The vulnerability stems from improper S3 authorization header processing and can be exploited with a simple HTTP request. Immediate patching to versions 11.3.1+ or 10.8.4+ is strongly recommended.
OPENCTI LABELS :
authentication bypass,anydesk,meshcentral,crushftp,cve-2025-31161,telegram bot,meshcentral agent
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
CrushFTP CVE-2025-31161 Auth Bypass and Post-Exploitation