Low Severity
CVE-2024-50623
Published: Jun 24, 2025
This exploit targets a dos vulnerability in Nginx Reader.
The vulnerability allows an attacker to:
- Execute arbitrary code
- Escalate privileges
- Access sensitive data
- Bypass security controls
Tested on multiple versions of Reader.
#!/usr/bin/env python3
# Nginx Reader - Dos
# Exploit for CVE-2024-50623
import socket
import struct
target = "192.168.1.100"
port = 50015
payload = b"A" * 1276
shellcode = b"\x90" * 170
print(f"Exploiting {target}:{port}")
# Exploit implementation would go here