#redishell search results

🚨 Security Advisory — #RediShell RCE (CVE-2025-49844) 🚨​ The RediShell #RCE is a critical use-after-free flaw in Redis's Lua engine enabling host-level Remote Code Execution (RCE).​ ☑️59,000+ exposed Redis instances detected​ ☑️8,500 unpatched Redis instances detected​ ​ Query…

CriminalIP_US's tweet image. 🚨 Security Advisory — #RediShell RCE (CVE-2025-49844) 🚨​
The RediShell #RCE is a critical use-after-free flaw in Redis's Lua engine enabling host-level Remote Code Execution (RCE).​

☑️59,000+ exposed Redis instances detected​
☑️8,500 unpatched Redis instances detected​
​
Query…

🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell @hexacon_fr

benny_isaacs's tweet image. 🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE.
Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation.
See you on Friday 👋
#Redis #Security #RediShell
@hexacon_fr

ALARMA en Redis: 13 AÑOS con bug que da RCE total. RediShell expone 60K instancias como puertas traseras. Lua sandbox roto, memoria corrupta... ¿Tu DB el próximo zombie? Actualiza y bloquea EVAL. Detalles: kernelreload.blogspot.com/2025/10/redis-… #RediShell #CVE2025_49844 #CyberSecurity

KernelReload's tweet image. ALARMA en Redis: 13 AÑOS con bug que da RCE total. RediShell expone 60K instancias como puertas traseras. Lua sandbox roto, memoria corrupta... ¿Tu DB el próximo zombie? Actualiza y bloquea EVAL. 
Detalles: kernelreload.blogspot.com/2025/10/redis-…
 #RediShell #CVE2025_49844 #CyberSecurity

💥 #RediShell (CVE-2025-49844) 패지 지연 안내 및 권고 ​ Redis의 Lua 엔진 취약점을 악용한 원격 코드 실행(RCE) 공격이 활발히 관찰되고 있습니다. ​ ​ Criminal IP Search로 확인한 결과, 인터넷에 노출된 Redis 인스턴스 59,755건 중 8,500건이 여전히 해당 취약점의 영향을 받는 것으로…

CriminalIP_KR's tweet image. 💥 #RediShell (CVE-2025-49844) 패지 지연 안내 및 권고 ​
Redis의 Lua 엔진 취약점을 악용한 원격 코드 실행(RCE) 공격이 활발히 관찰되고 있습니다. ​
​
Criminal IP Search로 확인한 결과, 인터넷에 노출된 Redis 인스턴스 59,755건 중 8,500건이 여전히 해당 취약점의 영향을 받는 것으로…

🚨 New Redis RCE Alert: CVE-2025-49844 wiz.io/blog/wiz-resea… Wiz Research uncovers #RediShell — a critical 13-year-old bug in Redis affecting 75% of cloud environments. 🔓 Exploits Lua scripting to escape sandbox & execute native code 🔥 CVSS 10.0 — full host takeover…

0x534c's tweet image. 🚨 New Redis RCE Alert: CVE-2025-49844

wiz.io/blog/wiz-resea…

Wiz Research uncovers #RediShell — a critical 13-year-old bug in Redis affecting 75% of cloud environments.

🔓 Exploits Lua scripting to escape sandbox & execute native code
🔥 CVSS 10.0 — full host takeover…

The "RediShell" RCE vulnerability (CVE-2025-49844) poses a critical risk to over 8,500 exposed Redis instances, urging users to apply patches and enable authentication immediately to prevent remote code execution threats. #RediShell #CVE202549844 blog.criminalip.io/2025/10/29/red…


A practical lab environment for testing and understanding the critical CVE-2025-49844 (RediShell) vulnerability in Redis. github.com/raminfp/redis_… Update to Redis 8.2.2+ immediately #RediShell #Security #RedTeam #PenTesting #SecurityResearch

realraminfp's tweet image. A practical lab environment for testing and understanding the critical CVE-2025-49844 (RediShell) vulnerability in Redis.

github.com/raminfp/redis_…

Update to Redis 8.2.2+ immediately

#RediShell  #Security #RedTeam #PenTesting #SecurityResearch

💥 #RediShell (CVE-2025-49844) パッチ未適用の状況と対応推奨​ Redis の Lua エンジン脆弱性を悪用するリモートコード実行(RCE)攻撃が活発に観測されています。​ Criminal IP Search の確認では、インターネットに公開されている Redis インスタンス 59,755件 のうち 8,500件…

CriminalIP_JP's tweet image. 💥 #RediShell (CVE-2025-49844) パッチ未適用の状況と対応推奨​

Redis の Lua エンジン脆弱性を悪用するリモートコード実行(RCE)攻撃が活発に観測されています。​
Criminal IP Search の確認では、インターネットに公開されている Redis インスタンス 59,755件 のうち 8,500件…

⚠️ 13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System Read more: cybersecuritynews.com/redis-rce-vuln… A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed #RediShell, allows attackers to gain full access to the underlying…

The_Cyber_News's tweet image. ⚠️ 13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System 

Read more: cybersecuritynews.com/redis-rce-vuln…

A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed #RediShell, allows attackers to gain full access to the underlying…

Alerte sécurité : Des chercheurs de Wiz ont découvert une faille sévère dans les instances de Redis aboutissant à l'exécution de code à distance. L'éditeur de la base de données en mémoire vient de livrer un correctif à appliquer rapidement. #CyberSecurite #RediShell

EspaceIT's tweet image. Alerte sécurité : Des chercheurs de Wiz ont découvert une faille sévère dans les instances de Redis aboutissant à l'exécution de code à distance.

L'éditeur de la base de données en mémoire vient de livrer un correctif à appliquer rapidement.
#CyberSecurite #RediShell

📢🚨 RediShell, a 13 year old Redis vulnerability, leaves about 60,000 unauthenticated servers open to remote code execution. Read more: hackread.com/13-year-old-re… #Cybersecurity #InfoSec #RediShell #Redis #Vulnerability #InfoSec


Разработчики #Redis сообщили об устранении критической уязвимости #CVE-2025-49844, получившей название #RediShell. Ошибка существовала в исходном коде проекта около 13 лет и могла позволить злоумышленнику выполнить произвольный код на сервере: securitymedia.org/news/redis-ust… #Lua #ИБ

infosecmedia_'s tweet image. Разработчики #Redis сообщили об устранении критической уязвимости #CVE-2025-49844, получившей название #RediShell.

Ошибка существовала в исходном коде проекта около 13 лет и могла позволить злоумышленнику выполнить произвольный код на сервере: securitymedia.org/news/redis-ust…

#Lua #ИБ

A critical 13-year-old RCE vulnerability has been found in Redis. CVE-2025-49844 (aka #RediShell) scores CVSS 10 and allows full host takeover via malicious Lua scripts. This affects all Redis versions. Source: wiz.io/blog/wiz-resea… #CyberSecurity #Redis #CloudSecurity #RCE


Oh! we have a remote! 🚨 #RediShell (CVE-2025-49844) Critical RCE in Redis (CVSS 10.0). A 13-year-old Use-After-Free bug lets attackers run native code via malicious Lua scripts escaping the sandbox bypassing boomer overflow protections. Impacts all Redis versions. Patch!


#RediShell: Redis/Valkey に「Perfect 10」の重大な RCE 脆弱性が発見される #RediShell: Redis/Valkey Get ‘Perfect 10’ Critical RCE Vuln #SecurityBoulevard (Oct 7) securityboulevard.com/2025/10/redis-…


Critical Redis instances exposed! Patch #RediShell RCE now and enforce authentication. Don’t wait for disaster to strike. #Cybersecurity


🚨 Security Advisory — #RediShell RCE (CVE-2025-49844) 🚨​ The RediShell #RCE is a critical use-after-free flaw in Redis's Lua engine enabling host-level Remote Code Execution (RCE).​ ☑️59,000+ exposed Redis instances detected​ ☑️8,500 unpatched Redis instances detected​ ​ Query…

CriminalIP_US's tweet image. 🚨 Security Advisory — #RediShell RCE (CVE-2025-49844) 🚨​
The RediShell #RCE is a critical use-after-free flaw in Redis's Lua engine enabling host-level Remote Code Execution (RCE).​

☑️59,000+ exposed Redis instances detected​
☑️8,500 unpatched Redis instances detected​
​
Query…

💥 #RediShell (CVE-2025-49844) パッチ未適用の状況と対応推奨​ Redis の Lua エンジン脆弱性を悪用するリモートコード実行(RCE)攻撃が活発に観測されています。​ Criminal IP Search の確認では、インターネットに公開されている Redis インスタンス 59,755件 のうち 8,500件…

CriminalIP_JP's tweet image. 💥 #RediShell (CVE-2025-49844) パッチ未適用の状況と対応推奨​

Redis の Lua エンジン脆弱性を悪用するリモートコード実行(RCE)攻撃が活発に観測されています。​
Criminal IP Search の確認では、インターネットに公開されている Redis インスタンス 59,755件 のうち 8,500件…

💥 #RediShell (CVE-2025-49844) 패지 지연 안내 및 권고 ​ Redis의 Lua 엔진 취약점을 악용한 원격 코드 실행(RCE) 공격이 활발히 관찰되고 있습니다. ​ ​ Criminal IP Search로 확인한 결과, 인터넷에 노출된 Redis 인스턴스 59,755건 중 8,500건이 여전히 해당 취약점의 영향을 받는 것으로…

CriminalIP_KR's tweet image. 💥 #RediShell (CVE-2025-49844) 패지 지연 안내 및 권고 ​
Redis의 Lua 엔진 취약점을 악용한 원격 코드 실행(RCE) 공격이 활발히 관찰되고 있습니다. ​
​
Criminal IP Search로 확인한 결과, 인터넷에 노출된 Redis 인스턴스 59,755건 중 8,500건이 여전히 해당 취약점의 영향을 받는 것으로…

The "RediShell" RCE vulnerability (CVE-2025-49844) poses a critical risk to over 8,500 exposed Redis instances, urging users to apply patches and enable authentication immediately to prevent remote code execution threats. #RediShell #CVE202549844 blog.criminalip.io/2025/10/29/red…


🚨 Redis expone una falla crítica CVSS 10.0 tras 13 años: RediShell permite ejecución remota de código vía Lua. 🔓 +60,000 instancias sin autenticación están en riesgo. 🛡️ ¡Actualiza ya! #RediShell #CVE202549844 #Redis #CybersecurityAwareness thehackernews.com/2025/10/13-yea…


ALARMA en Redis: 13 AÑOS con bug que da RCE total. RediShell expone 60K instancias como puertas traseras. Lua sandbox roto, memoria corrupta... ¿Tu DB el próximo zombie? Actualiza y bloquea EVAL. Detalles: kernelreload.blogspot.com/2025/10/redis-… #RediShell #CVE2025_49844 #CyberSecurity

KernelReload's tweet image. ALARMA en Redis: 13 AÑOS con bug que da RCE total. RediShell expone 60K instancias como puertas traseras. Lua sandbox roto, memoria corrupta... ¿Tu DB el próximo zombie? Actualiza y bloquea EVAL. 
Detalles: kernelreload.blogspot.com/2025/10/redis-…
 #RediShell #CVE2025_49844 #CyberSecurity

🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell @hexacon_fr

benny_isaacs's tweet image. 🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE.
Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation.
See you on Friday 👋
#Redis #Security #RediShell
@hexacon_fr

Alerte sécurité : Des chercheurs de Wiz ont découvert une faille sévère dans les instances de Redis aboutissant à l'exécution de code à distance. L'éditeur de la base de données en mémoire vient de livrer un correctif à appliquer rapidement. #CyberSecurite #RediShell

EspaceIT's tweet image. Alerte sécurité : Des chercheurs de Wiz ont découvert une faille sévère dans les instances de Redis aboutissant à l'exécution de code à distance.

L'éditeur de la base de données en mémoire vient de livrer un correctif à appliquer rapidement.
#CyberSecurite #RediShell

Разработчики #Redis сообщили об устранении критической уязвимости #CVE-2025-49844, получившей название #RediShell. Ошибка существовала в исходном коде проекта около 13 лет и могла позволить злоумышленнику выполнить произвольный код на сервере: securitymedia.org/news/redis-ust… #Lua #ИБ

infosecmedia_'s tweet image. Разработчики #Redis сообщили об устранении критической уязвимости #CVE-2025-49844, получившей название #RediShell.

Ошибка существовала в исходном коде проекта около 13 лет и могла позволить злоумышленнику выполнить произвольный код на сервере: securitymedia.org/news/redis-ust…

#Lua #ИБ

A critical 13-year-old RCE vulnerability has been found in Redis. CVE-2025-49844 (aka #RediShell) scores CVSS 10 and allows full host takeover via malicious Lua scripts. This affects all Redis versions. Source: wiz.io/blog/wiz-resea… #CyberSecurity #Redis #CloudSecurity #RCE


#RediShell: Redis/Valkey に「Perfect 10」の重大な RCE 脆弱性が発見される #RediShell: Redis/Valkey Get ‘Perfect 10’ Critical RCE Vuln #SecurityBoulevard (Oct 7) securityboulevard.com/2025/10/redis-…


HackRead: 📢🚨 RediShell, a 13 year old Redis vulnerability, leaves about 60,000 unauthenticated servers open to remote code execution. Read more: hackread.com/13-year-old-re… #Cybersecurity #InfoSec #RediShell #Redis #Vulnerability #InfoSec


📢🚨 RediShell, a 13 year old Redis vulnerability, leaves about 60,000 unauthenticated servers open to remote code execution. Read more: hackread.com/13-year-old-re… #Cybersecurity #InfoSec #RediShell #Redis #Vulnerability #InfoSec


Full Details: technadu.com/redis-rce-redi… 💬 Have you already updated your Redis instances or deployed mitigations? Let’s talk in the comments. #Redis #RediShell #Vulnerability #DataSecurity #CyberAwareness #WizResearch


🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE. Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation. See you on Friday 👋 #Redis #Security #RediShell @hexacon_fr

benny_isaacs's tweet image. 🔥 Curious how we exploited CVE-2025-49844 (RediShell)? From a 2-bit reset to 0-click RCE.
Come see me at Hexacon 2025 - Paris, where I’ll share in-depth technical details on the exploitation.
See you on Friday 👋
#Redis #Security #RediShell
@hexacon_fr

💥 #RediShell (CVE-2025-49844) 패지 지연 안내 및 권고 ​ Redis의 Lua 엔진 취약점을 악용한 원격 코드 실행(RCE) 공격이 활발히 관찰되고 있습니다. ​ ​ Criminal IP Search로 확인한 결과, 인터넷에 노출된 Redis 인스턴스 59,755건 중 8,500건이 여전히 해당 취약점의 영향을 받는 것으로…

CriminalIP_KR's tweet image. 💥 #RediShell (CVE-2025-49844) 패지 지연 안내 및 권고 ​
Redis의 Lua 엔진 취약점을 악용한 원격 코드 실행(RCE) 공격이 활발히 관찰되고 있습니다. ​
​
Criminal IP Search로 확인한 결과, 인터넷에 노출된 Redis 인스턴스 59,755건 중 8,500건이 여전히 해당 취약점의 영향을 받는 것으로…

🚨 Security Advisory — #RediShell RCE (CVE-2025-49844) 🚨​ The RediShell #RCE is a critical use-after-free flaw in Redis's Lua engine enabling host-level Remote Code Execution (RCE).​ ☑️59,000+ exposed Redis instances detected​ ☑️8,500 unpatched Redis instances detected​ ​ Query…

CriminalIP_US's tweet image. 🚨 Security Advisory — #RediShell RCE (CVE-2025-49844) 🚨​
The RediShell #RCE is a critical use-after-free flaw in Redis's Lua engine enabling host-level Remote Code Execution (RCE).​

☑️59,000+ exposed Redis instances detected​
☑️8,500 unpatched Redis instances detected​
​
Query…

🚨 New Redis RCE Alert: CVE-2025-49844 wiz.io/blog/wiz-resea… Wiz Research uncovers #RediShell — a critical 13-year-old bug in Redis affecting 75% of cloud environments. 🔓 Exploits Lua scripting to escape sandbox & execute native code 🔥 CVSS 10.0 — full host takeover…

0x534c's tweet image. 🚨 New Redis RCE Alert: CVE-2025-49844

wiz.io/blog/wiz-resea…

Wiz Research uncovers #RediShell — a critical 13-year-old bug in Redis affecting 75% of cloud environments.

🔓 Exploits Lua scripting to escape sandbox & execute native code
🔥 CVSS 10.0 — full host takeover…

ALARMA en Redis: 13 AÑOS con bug que da RCE total. RediShell expone 60K instancias como puertas traseras. Lua sandbox roto, memoria corrupta... ¿Tu DB el próximo zombie? Actualiza y bloquea EVAL. Detalles: kernelreload.blogspot.com/2025/10/redis-… #RediShell #CVE2025_49844 #CyberSecurity

KernelReload's tweet image. ALARMA en Redis: 13 AÑOS con bug que da RCE total. RediShell expone 60K instancias como puertas traseras. Lua sandbox roto, memoria corrupta... ¿Tu DB el próximo zombie? Actualiza y bloquea EVAL. 
Detalles: kernelreload.blogspot.com/2025/10/redis-…
 #RediShell #CVE2025_49844 #CyberSecurity

⚠️ 13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System Read more: cybersecuritynews.com/redis-rce-vuln… A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed #RediShell, allows attackers to gain full access to the underlying…

The_Cyber_News's tweet image. ⚠️ 13-year-old Critical Redis RCE Vulnerability Let Attackers Gain Full Access to Host System 

Read more: cybersecuritynews.com/redis-rce-vuln…

A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed #RediShell, allows attackers to gain full access to the underlying…

Alerte sécurité : Des chercheurs de Wiz ont découvert une faille sévère dans les instances de Redis aboutissant à l'exécution de code à distance. L'éditeur de la base de données en mémoire vient de livrer un correctif à appliquer rapidement. #CyberSecurite #RediShell

EspaceIT's tweet image. Alerte sécurité : Des chercheurs de Wiz ont découvert une faille sévère dans les instances de Redis aboutissant à l'exécution de code à distance.

L'éditeur de la base de données en mémoire vient de livrer un correctif à appliquer rapidement.
#CyberSecurite #RediShell

💥 #RediShell (CVE-2025-49844) パッチ未適用の状況と対応推奨​ Redis の Lua エンジン脆弱性を悪用するリモートコード実行(RCE)攻撃が活発に観測されています。​ Criminal IP Search の確認では、インターネットに公開されている Redis インスタンス 59,755件 のうち 8,500件…

CriminalIP_JP's tweet image. 💥 #RediShell (CVE-2025-49844) パッチ未適用の状況と対応推奨​

Redis の Lua エンジン脆弱性を悪用するリモートコード実行(RCE)攻撃が活発に観測されています。​
Criminal IP Search の確認では、インターネットに公開されている Redis インスタンス 59,755件 のうち 8,500件…

A practical lab environment for testing and understanding the critical CVE-2025-49844 (RediShell) vulnerability in Redis. github.com/raminfp/redis_… Update to Redis 8.2.2+ immediately #RediShell #Security #RedTeam #PenTesting #SecurityResearch

realraminfp's tweet image. A practical lab environment for testing and understanding the critical CVE-2025-49844 (RediShell) vulnerability in Redis.

github.com/raminfp/redis_…

Update to Redis 8.2.2+ immediately

#RediShell  #Security #RedTeam #PenTesting #SecurityResearch

Разработчики #Redis сообщили об устранении критической уязвимости #CVE-2025-49844, получившей название #RediShell. Ошибка существовала в исходном коде проекта около 13 лет и могла позволить злоумышленнику выполнить произвольный код на сервере: securitymedia.org/news/redis-ust… #Lua #ИБ

infosecmedia_'s tweet image. Разработчики #Redis сообщили об устранении критической уязвимости #CVE-2025-49844, получившей название #RediShell.

Ошибка существовала в исходном коде проекта около 13 лет и могла позволить злоумышленнику выполнить произвольный код на сервере: securitymedia.org/news/redis-ust…

#Lua #ИБ

Loading...

Something went wrong.


Something went wrong.


United States Trends