Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2025-33053 Proof Of Concept (PoC) | https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept | POC Details |
| 2 | CVE-2025-33053 Checker and PoC | https://github.com/TheTorjanCaptain/CVE-2025-33053-Checker-PoC | POC Details |
| 3 | Proof-of-Concept for CVE-2025-33053 Exploiting WebDAV with .url file delivery to demonstrate realistic remote code execution. Includes a decoy PDF payload and a video-only showcase of potential command-and-control capabilities. | https://github.com/kra1t0/CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept | POC Details |
| 4 | POC exploit for CVE-2025-33053 (External control of file execution path in URL file) | https://github.com/4n4s4zi/CVE-2025-33053_PoC | POC Details |
| 5 | POC for CVE-2025-33053 WebDav Exploit, demonstrating how the vulnerability can be triggered in a real environment. This repository focuses on hands-on exploitation steps, reproducible test cases, and observable impact, helping security researchers and defenders understand the issue and validate fixes. | https://github.com/Cyberw1ng/CVE-2025-33053-POC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet