A sophisticated interactive exploitation tool for CVE-2025-66478 - a critical Next.js RCE vulnerability. This tool provides a god-mode terminal interface for authorized penetration testing and security research.
- Interactive Terminal: Beautiful colored terminal interface with command history
- Real-time RCE: Execute commands on vulnerable Next.js servers
- File Operations: Upload/download files, directory navigation
- System Recon: Built-in reconnaissance commands
- Cross-Platform: Works on both Linux/Unix and Windows targets
- Session Management: Persistent session tracking and logging
- Python 3.7 or higher
- pip package manager
- Clone the repository:
git clone https://github.com/ssmvl2/Nextjs-RCE-Exploit.git
cd Nextjs-RCE-Exploit- Install dependencies:
pip install -r requirements.txt- Run the tool:
Linux/macOS:
python3 god_access.py https://vulnerable-target.comWindows:
python god_access.py https://vulnerable-target.comLinux/macOS:
python3 god_access.py https://target-domain.comWindows:
python god_access.py https://target-domain.comLinux/macOS:
# Disable SSL verification (for self-signed certs)
python3 god_access.py https://target.com --insecure
# Set custom timeout
python3 god_access.py https://target.com --timeout 60
# Show help
python3 god_access.py --helpWindows:
# Disable SSL verification (for self-signed certs)
python god_access.py https://target.com --insecure
# Set custom timeout
python god_access.py https://target.com --timeout 60
# Show help
python god_access.py --helpOnce connected, you'll have access to these built-in commands:
sysinfo- Get comprehensive system detailsuname- Show kernel/system informationps- List running processesnetstat- Show network connections
ls [dir]- List directory contentscd <dir>- Change directorycat <file>- View file contentspwd- Show current directorydownload <remote> <local>- Download filesupload <local> <remote>- Upload files
ping <host>- Ping network hostscurl <url>- Fetch URLswget <url>- Download from webifconfig/ipconfig- Network interface info
sudo -l- Check sudo permissionsfindsuid- Find SUID binariescrontab -l- List cron jobsenv- Show environment variables
help- Show help menuclear- Clear terminal screenhistory- Show command historypwnd- Show exploitation statusexit/quit- Exit the shell
This tool is provided for educational purposes only. The author is not responsible for any misuse or damage caused by this tool. Use only:
- On systems you own
- On systems you have explicit written permission to test
- In controlled lab environments for research
- Always obtain proper authorization before testing
- Comply with all applicable laws and regulations
- Respect privacy and data protection laws
- Use only for legitimate security assessment purposes
Critical RCE vulnerability in Next.js allowing arbitrary code execution via specially crafted HTTP requests.
- Next.js versions 13.0.0 - 14.2.0
- Server-side rendering enabled
- Certain middleware configurations
The tool automatically detects vulnerable endpoints and validates access before providing interactive shell.
# Create virtual environment
python3 -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt
# Run against test server (authorized targets only)
python3 god_access.py https://test-target.com
Contributions are welcome! Please follow these steps:
- Fork the repository
- Create a feature branch (
git checkout -b feature/AmazingFeature) - Commit changes (
git commit -m 'Add AmazingFeature') - Push to branch (
git push origin feature/AmazingFeature) - Open a Pull Request
- Follow PEP 8 guidelines
- Add comments for complex logic
- Include error handling
- Update documentation accordingly
This project is licensed under the MIT License - see the LICENSE file for details.
If you discover a vulnerability using this tool:
- Do not exploit without permission
- Report to the affected organization immediately
- Follow responsible disclosure practices
- Allow reasonable time for patching
For issues and questions:
- Check the Issues page
- Ensure you're using the latest version
- Provide detailed reproduction steps
Remember: With great power comes great responsibility. Use this tool ethically and legally.
This tool is for authorized security testing and educational purposes only.
Author: tganga369
Repository: https://github.com/ssmvl2/Nextjs-RCE-Exploit/
Last Updated: December 2025