Skip to content

mrmtwoj/React2Shell-CVE-2025-55182

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

$$\      $$\ $$$$$$$\      $$\      $$\ $$$$$$$$\ $$\      $$\  $$$$$$\     $$$$$\ 
$$$\    $$$ |$$  __$$\     $$$\    $$$ |\__$$  __|$$ | $\  $$ |$$  __$$\    \__$$ |
$$$$\  $$$$ |$$ |  $$ |    $$$$\  $$$$ |   $$ |   $$ |$$$\ $$ |$$ /  $$ |      $$ |
$$\$$\$$ $$ |$$$$$$$  |    $$\$$\$$ $$ |   $$ |   $$ $$ $$\$$ |$$ |  $$ |      $$ |
$$ \$$$  $$ |$$  __$$<     $$ \$$$  $$ |   $$ |   $$$$  _$$$$ |$$ |  $$ |$$\   $$ |
$$ |\$  /$$ |$$ |  $$ |    $$ |\$  /$$ |   $$ |   $$$  / \$$$ |$$ |  $$ |$$ |  $$ |
$$ | \_/ $$ |$$ |  $$ |$$\ $$ | \_/ $$ |   $$ |   $$  /   \$$ | $$$$$$  |\$$$$$$  |
\__|     \__|\__|  \__|\__|\__|     \__|   \__|   \__/     \__| \______/  \______/ 

📌 Overview

Safe IP Structure Checker is an educational and non‑intrusive tool designed to:

  • Parse and validate IP addresses
  • Support wildcard patterns (*)
  • Expand CIDR ranges (/24, /16, etc.)
  • Normalize targets into full URLs
  • Simulate proxy configuration
  • Demonstrate how data flows inside a scanner framework
  • Provide information about CVE‑2025‑55182 for academic and research purposes

⚠️ This tool does NOT perform scanning, exploitation, payload delivery, or network intrusion.
It is strictly for academic demonstrations, isolated lab research, network analysis, and teaching security concepts.


⭐ Features

Feature Description
-ip Accepts a single IP / wildcard / CIDR
-ips Load IPs from a file
-port Attach a port to the generated URL
-proxy Simulated proxy routing display
-about Show educational information about CVE‑2025‑55182
Wildcard expansion e.g., 192.168.1.*
CIDR expansion e.g., 192.168.0.0/24
Hard safety limits Max 65,536 expanded hosts
Non‑exploit tool No network requests or execution

🔧 Installation

git clone https://github.com/github/React2Shell-CVE-2025-55182
cd React2Shell-CVE-2025-55182

🚀 Usage Examples

  1. Single IP
python3 React2Shell-CVE-2025-55182.py -ip 192.168.1.10
  1. Wildcard
python3 React2Shell-CVE-2025-55182.py -ip 192.168.1.*
  1. CIDR Range
python3 React2Shell-CVE-2025-55182.py -ip 10.0.0.0/24
  1. Add Port
python3 React2Shell-CVE-2025-55182.py -ip 10.0.0.15 -port 8080
  1. Use Proxy (simulation only)
python3 React2Shell-CVE-2025-55182.py -ip 192.168.0.5 -proxy http://127.0.0.1:8080
  1. Load IPs from File
python3 React2Shell-CVE-2025-55182.py -ips targets.txt
  1. About / Educational Info
python3 React2Shell-CVE-2025-55182.py -about

📁 Example targets.txt

192.168.1.10
192.168.1.*
10.0.0.0/30
8.8.8.8

📤 Sample Output

[INFO] Processing Target URL: http://192.168.1.10:8080
[✓] Target processed: http://192.168.1.10:8080
python3 React2Shell-CVE-2025-55182.py -h

About

Educational / research tool related to React / Next.js vulnerability CVE‑2025‑55182 (“React2Shell”).

Topics

Resources

Stars

Watchers

Forks

Languages