Metasploit Wrap-Up 01/30/2026 #1836
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This Rapid7 post (Metasploit Wrap-Up dated Jan 30, 2026) summarizes newly merged Metasploit Framework content: multiple exploit modules (mostly CVE-based), new persistence modules, and a few framework fixes. While the post itself does not include raw exploit code, it provides directly actionable module names/paths, CVE IDs, and the exploitation primitives each module implements (auth-bypass chaining, SQLi-to-cron execution, unrestricted upload to webshell, and path tr...
🔧 Technical Details
Auth-bypass chaining (pre-auth → post-auth attack surface exposure)
If an application has an authentication bypass (e.g., CVE-2025-66039 in FreePBX), an attacker can treat “authenticated-only” endpoints as reachable. This expands the reachable attack surface to include bugs that normally require login (SQLi, upload endpoints), enabling pre-auth compromise by chaining vulnerabilities.
SQL injection as a write primitive to gain OS execution via schedulers
When SQL injection (CVE-2025-61675) allows INSERT/UPDATE of scheduler-related database tables (e.g., a
cron_jobtable), an attacker can create a job that runs attacker-controlled commands. This turns database-layer write access into RCE when the scheduler executes the inserted task.Unrestricted file upload → webshell placement → HTTP-triggered RCE
If a feature permits uploading arbitrary files (e.g., firmware upload, CVE-2025-61678), an attacker...
🤖 Agent Actions
Updated HackTricks with new exploitation primitives and persistence TTPs:
/etc/cron.ddrop-in on Linux). Added Rapid7 wrap-up reference.No tests were run (documentation-only changes).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.