# HTB-Soulmate









CrushFTP CVE-2025-31161 Auth Bypass and Post-Exploitation
https://github.com/Immersive-Labs-Sec/CVE-2025-31161




change password user ben

login to user ben, we can see the program for the web page was stored there.

upload file and create revshell



access to http://soulmate.htb/shell.php and get revshell



Notice that root has previously run a login script

got password

ssh and get first flag

The escript mentioned earlier is a program in Erlang that starts an SSH server (SSH daemon), and it is open on port 2222, so we will connect to it.
Check the port opening status and find that the Erlang-based SSH service is running on port 2222


use m() -- which modules are loaded

use os to get flag os:cmd(CommandString).
