关联漏洞
描述
powershell version of hawktrace POC exploit
介绍
# CVE-2025-59287-WSUS
powershell version of hawktrace POC exploit
https://hawktrace.com/blog/CVE-2025-59287-UNAUTH
1: edit the variables in the script (url, port, etc)
2: start netcat listener
3: run script - it will auto download ysoserial.net, generate the payload and send exploit to WSUS server
this will generate a new computer in your console named hawktrace.local
<img width="645" height="147" alt="image" src="https://github.com/user-attachments/assets/d49dbf2b-fe30-4a5f-9e48-e336685432a2" />
4: (re)open the WSUS console to trigger the exploit.
the console will run into an error
<img width="830" height="281" alt="image" src="https://github.com/user-attachments/assets/379d202d-a048-4880-a51c-96fd68a7c83f" />
but this triggers the reverse shell and connect you your kali:
<img width="512" height="120" alt="image" src="https://github.com/user-attachments/assets/804c8655-9463-41df-881d-fda2ba5d2305" />
# Testing / Infos
tested on (unpatched) server 2022, wsus version 10.0.20348.1
<img width="712" height="319" alt="image" src="https://github.com/user-attachments/assets/dfe3b98c-ba61-44fd-aaf9-8e9ef422a683" />
use at your own risk. no support, no guarantees.
文件快照
[4.0K] /data/pocs/2bea576035cac30104a3f46baa8a485ad3e03fb3
├── [1.2K] README.md
└── [ 14K] wsus-rce.ps1
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。