Reportedly, a zero-day exploit targeting VMware ESXi Shell Service is available for purchase. The exploit enables an authentication bypass, allowing remote file uploads by the vpxuser into the /scratch directory. The package includes an auto-exploitation Python script designed to generate and deliver malicious packets. The asking price for this exploit is $1,500,000 payable via Monero. To execute the exploit successfully, the ESXi shell service must be enabled on the target host, IPv4 must be set as primary (IPv6 is not supported), and the target system must be running vSphere ESXi 7.x/8.x.