POC详情: 2bea576035cac30104a3f46baa8a485ad3e03fb3

来源
关联漏洞
标题: Microsoft Windows Server 代码问题漏洞 (CVE-2025-59287)
描述:Microsoft Windows Server是美国微软(Microsoft)公司的一套服务器操作系统。 Microsoft Windows Server存在代码问题漏洞,该漏洞源于攻击者利用该漏洞可以远程执行代码。
描述
powershell version of hawktrace POC exploit
介绍
# CVE-2025-59287-WSUS
powershell version of hawktrace POC exploit
https://hawktrace.com/blog/CVE-2025-59287-UNAUTH

1: edit the variables in the script (url, port, etc)

2: start netcat listener

3: run script - it will auto download ysoserial.net, generate the payload and send exploit to WSUS server

this will generate a new computer in your console named hawktrace.local

<img width="645" height="147" alt="image" src="https://github.com/user-attachments/assets/d49dbf2b-fe30-4a5f-9e48-e336685432a2" />



4: (re)open the WSUS console to trigger the exploit. 

the console will run into an error

<img width="830" height="281" alt="image" src="https://github.com/user-attachments/assets/379d202d-a048-4880-a51c-96fd68a7c83f" />

but this triggers the reverse shell and connect you your kali:

<img width="512" height="120" alt="image" src="https://github.com/user-attachments/assets/804c8655-9463-41df-881d-fda2ba5d2305" />



# Testing / Infos
tested on (unpatched) server 2022, wsus version 10.0.20348.1
<img width="712" height="319" alt="image" src="https://github.com/user-attachments/assets/dfe3b98c-ba61-44fd-aaf9-8e9ef422a683" />

use at your own risk. no support, no guarantees.
文件快照

[4.0K] /data/pocs/2bea576035cac30104a3f46baa8a485ad3e03fb3 ├── [1.2K] README.md └── [ 14K] wsus-rce.ps1 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。