CVE-2026-37552 POC (Proof-of-Concept)

CVE-2026-37552 POC (Proof-of-Concept)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). No authentication or signature verification exists on the TCP connection. An attacker with access to the localhost TCP port (server binds 127.0.0.1) can send a crafted serialized PHP closure to achieve arbitrary code execution.

Published: 2026-05-01

CVSS: 8.4

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download CVE-2026-37552 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-348-cve-2026-42439/

https://hokyo.gr/poc-216-cve-2026-7727/

https://hokyo.gr/poc-568-cve-2026-7898/

https://hokyo.gr/poc-161-cve-2026-5110/

Copyright 2017- 2025 Hokyo JapanEats ©