the grugq's newsletter

Archives
Subscribe
December 7, 2025

December 5-6-7, 2025

December 5-6-7, 2025

Administrivia: sorry for the delay, it’s been hectic. Somehow I managed to get deadlines converge on the same day and my normal “procrastinate until the last minute” process turned out to be less than ideal.


Holy shit… the exploitation of CVE-2025-55182 has reached a new level. There’s now a publicly available Chrome extension on GitHub that automatically scans for and exploits vulnerable sites as you browse. Absolutely wild. 🤦‍♂️ pic.twitter.com/Owpzb1llEr

— Marius Avram (@securityshell) December 5, 2025


How do IR folks deal with time zones? When someone says “12:37” without specifying, do you have to convert it to every single time zone as a possibility? Can we delete time zones

— solst/ICE of Astarte (@IceSolst) December 4, 2025

Well, a lot of people would say that’s easy because there is no 37th month, so it is obviously December 37th. It gets tricky when it’s something like 12:09.

— thaddeus e. grugq (@thegrugq) December 5, 2025


Full RCE PoC is now live @ https://t.co/VFu7NxJ3TQ

Credit goes to @maple3142. Great job! Brilliant idea for the root reference. Felt like a CTF challenge indeed. Writing the full breakdown now. https://t.co/nLFnss4OZh

— Moritz Sanft (@stdoutput) December 4, 2025


A glorious Linux LPE:https://t.co/hIdXtnKzgF

— Gergely Kalman (@gergely_kalman) December 4, 2025


Intellexa Predator cyber tool (spyware hacking user devices) operates across multiple countries, recent targets identified in Pakistan, Kazakhstan, Angola, Egypt, Uzbekistan, Saudi Arabia, and Tajikistan. Among the users are at least 25 countries including Germany, Austria,… pic.twitter.com/qwmbRwZl9X

— Lukasz Olejnik (@lukOlejnik) December 4, 2025


If you’re following the AI + cyber uplift discourse closely you’ll want to take note of this particular case study. It’s not conclusive that LLMs could not have exploited this issue but the incorrect attempts it produced, which were further amplified by the community, are a… https://t.co/2oDb2gYwZm

— chrisrohlf (@chrisrohlf) December 5, 2025


When working on enabling MTE, Apple used an arm64->arm64 version of Rosetta that emulated MTE on existing hardware.

The XNU sources talk about it now pic.twitter.com/T3GWeDz9Na

— Longhorn (@never_released) December 4, 2025


my new blogpost is out!!

this one talks about a new web vulnerability class i discovered that allows for complex interactive cross-origin attacks and data exfiltration

and i've already used it to get a google docs bounty ^^

have fun <3https://t.co/PBct6aB24W

— Rebane (@rebane2001) December 4, 2025


IISS - The Scale of Russian Sabotage Operations Against Europe’s Critical Infrastructure https://t.co/pjelJ9UcvC

— Covert Intel and Operations (@covert_intel) December 4, 2025


Declassified CIA files are a goldmine of the bizarre, and cases like “Messrs. 1569 and 1571” are exactly why people get hooked. Sometimes the strangest leads are the ones that tell us the most about the era. 🕵️‍♂️📁#CIA #DeclassifiedFiles #Intelligence https://t.co/eAKr1Mqlzz

— Robert Morton (@Robert4787) December 5, 2025


This is an INCREDIBLE investigative story, reported in the form of a graphic novel. Arrested by phone - a true story.

A must read https://t.co/k6njyDVc0G

— Jason Leopold (@JasonLeopold) December 4, 2025


This pretty much sums up the situation: an in-memory (!) JavaScript-based (!) webshell gets implanted into a vulnerable React server with a single(!) POST request and leaves zero(!) trace in logs or on disk.

Someone used that POC, successfully injected the shell and still… https://t.co/B6SBsopR07 pic.twitter.com/of7hZ7WUOw

— Florian Roth ⚡️ (@cyb3rops) December 5, 2025


Yesterday a CVSS 10 dropped for React Server Components.

CVE-2025-55182.

Remote code execution.

I am a 10x developer.

I make $340,000 a year.

I have vested stock options.

I have not written code since 2023.

I prompt.

My entire codebase was generated by Claude.

I don't…

— Peter Girnus 🦅 (@gothburz) December 4, 2025


Slides from @n0psledbyte, @st424204 & @Peterpan980927 at @codeblue_jp talk are also up:

“Dancing with Exynos Coprocessor: Pwning Samsung for fun and ‘profit’”https://t.co/FaeX6SkoFc

Shout-out to @rainbowpigeon_ for contributing a lot in this research during his internship.

— starlabs (@starlabs_sg) December 5, 2025


This guy is complaining that GrapheneOS “failed him”. Showing a Belgian 🇧🇪 police request for an interrogation regarding premeditated murder (as a suspect). https://t.co/3EavQpF1go

— 🕳 (@sekurlsa_pw) December 6, 2025


Slide: https://t.co/H9WiHIqUEm

Thanks for the fantastic conference @POC_Crew :) https://t.co/bj6ZdVxFDB

— 1ce0ear (@1ce0ear) December 7, 2025


This issue can be discovered by ask AI to review the commit for vulnerability and modify the testcase included in the commit until it can trigger crash!
The only problem is these low hanging fruit is very rare, you must burn huge token to scan every commit to get one ( if lucky… https://t.co/2hNaNtwuyP

— Toan Pham (@__suto) December 7, 2025

Seems also same for this medium severity and probably non exploitable case:https://t.co/rNxY0dJmlW

— Toan Pham (@__suto) December 7, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:

Add a comment:

Share this email:
Share on Twitter Share on Hacker News Share via email Share on Mastodon Share on Bluesky
Twitter