#! Anatomy of a Bug

Autopsy of a Zero-Day. High-fidelity technical analyses of critical vulnerabilities, kernel exploits, and architectural failures.

License: CC BY-ND 4.0 Status: Active Author: @tralsesec

📜 Manifesto

#! Anatomy of a Bug is a weekly research series dedicated to deconstructing the most sophisticated exploits in the wild. We move beyond the “what” and focus on the “how” and “why.”

Each report follows a strict forensic structure:

  1. The Patient: The target system and its architectural context.
  2. The Diagnosis: The precise root cause (e.g., Integer Overflow, Race Condition, Logic Flaw).
  3. The Kill-Chain: Step-by-step reconstruction of the exploit flow (from entry to root/kernel).
  4. The Fix: Code-level remediation and developer takeaways.

📂 Case Files

ID Case Title CVE(s) Target Severity
#012 The MAESTRO Breakout: ESXi Ring -1 Compromise CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 VMware ESXi / VMCI 9.3
#011 PS5 Hypervisor Collapse N/A PlayStation 5 / Star Wars Racer Revenge N/A
#010 N8scape CVE-2025-68668 n8n Workflow Automation Platform 9.9
#009 AdonisJS BodyParser CVE-2026-21440 AdonisJS Framework (Node.js) 9.2
#008 EternalBlue CVE-2017-0144 Windows SMBv1 9.3
#007 MongoBleed CVE-2025-14847 MongoDB 8.7
#006 AsyncOS Quarantine Collapse CVE-2025-20393 Cisco Secure Email Gateway 10.0
#005 FortiWeb Edge Collapse CVE-2025-64446, CVE-2025-58034 Fortinet FortiWeb 9.8
#004 iOS26 “Liquid Glass” Exploitation Chain CVE-2025-14174, CVE-2025-43529, CVE-2025-46285 iPhone 12+ 10.0
#003 Firefox IPC Sandbox Escape CVE-2025-2857 Mozilla Firefox 10.0
#002 Lazarus 0day (AppLocker LPE) CVE-2024-21338 Windows AppLocker 7.8
#001 React2Shell RCE CVE-2025-55182 Next.js / React Server Components 10.0

🔬 Methodology

This repository serves as a knowledge base for Exploit Developers, Security Researchers, and Reverse Engineers. The goal is not just to document the vulnerability, but to understand the mindset of the attacker and the design failures of the defender.

Tools and techniques often referenced:

⚖️ License & Usage

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License (CC BY-ND 4.0).

You are free to:

Under the following terms:

See the LICENSE file for the full legal text.


“Security is not inherited. Every layer must defend itself.”#! Anatomy of a Bug #6