POC详情: 16ad3e9a7de5ae19bcdb2b25a15f0203a580b379

来源
关联漏洞
标题: Microsoft Windows Server 代码问题漏洞 (CVE-2025-59287)
描述:Microsoft Windows Server是美国微软(Microsoft)公司的一套服务器操作系统。 Microsoft Windows Server存在代码问题漏洞,该漏洞源于攻击者利用该漏洞可以远程执行代码。
描述
PoC for CVE-2025-59287
介绍
# WSUSploit.NET

C# PoC for CVE-2025-59287

Basically a port of the initial public PoC. Warning, will mess up WSUS.


## Disclaimer: 
This is for ethical and legal security testing, research, and education. Do not use any of this software in any unauthorized manner. 

## Defensive Considerations

These HTTP calls in this order. A more advanced threat actor may throw in random HTTP calls to avoid this detection.
IIS Log Path :`C:\inetpub\logs\LogFiles\<WSUS IIS SERVER>\<LOG FILE NAME>.log`
```
POST /ReportingWebService/ReportingWebService.asmx
POST /SimpleAuthWebService/SimpleAuth.asmx 
POST /ClientWebService/Client.asmx 
POST /ReportingWebService/ReportingWebService.asmx
```


Windows Event 7053 

Source: Windows Server Update Services

Windows Logs > Application
```
...
System.InvalidCastException -- Unable to cast object of type 'System.Windows.Data.ObjectDataProvider' to type 'System.Windows.Media.Brush'.
...
```
文件快照

[4.0K] /data/pocs/16ad3e9a7de5ae19bcdb2b25a15f0203a580b379 ├── [ 14K] Program.cs ├── [4.0K] Properties │   └── [ 139] launchSettings.json ├── [ 929] README.md ├── [ 242] WSUSploit.NET.csproj └── [1.1K] WSUSploit.NET.sln 1 directory, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。