POC详情: 5cdc82ea93ca9fe4e889cd59dfc293ff39b71377

来源
关联漏洞
标题: Erlang/OTP 访问控制错误漏洞 (CVE-2025-32433)
描述:Erlang/OTP是Erlang/OTP开源的一个JavaScript编写的处理处理异常的库。该库可以捕捉node.js内置API引发的异常。 Erlang/OTP 27.3.3之前版本存在访问控制错误漏洞,该漏洞源于SSH协议消息处理缺陷,可能导致远程代码执行。
描述
python script to find vulnerable targets of CVE-2025-32433 
介绍
# erl_mouse version 1.1

##### Alright, I've improved several things to increase chances of finding a vulnerable device or network.  Most are not public facing, have been patched, or are so oscure that it can be difficult to find a target. 
Nevertheless, we persist.  You can now scan every IP address in china by choosing "Type Presets" and then choose from the amount of blocks you want to scan at one time.  There are over 300 million IP addresses so take it easy.  Haha.
There are other more tailored categories to choose from that you may have a better chance with.  RabbitMQ and CouchDB IP blocks will typically use the vulnerable SSH service.  Okay, good luck with ERL MOUSE (v1.1)

  
python script to find vulnerable targets of CVE-2025-32433 

This script scans CIDR blocks to find vulnerable targets of CVE-2025-32433.  

Using Masscan as the workhorse of the operation, erl_mouse continues the discovery by creating and parsing a JSON file of all IP addresses with port 22 open.  The JSON parses for Erlang/OTP SSH banner regex & vulnerability thresholds provding only viable targets.

Findings will print in terminal and also provide a .CSV and .JSON

In theory, at least.

Although there are presets to scan [by several countries (more will be added), by type (telecom, cloud, even IOT if you are inside that network), etc.], your best bet is probaly entering in your own set of CIDR.


*For education and security research*

### Requirements

- Python3
- Masscan
- china_ip_ranges.txt needs to be in same directory folder as erl_mouse_v1-1.py
文件快照

[4.0K] /data/pocs/5cdc82ea93ca9fe4e889cd59dfc293ff39b71377 ├── [170K] china_ip_ranges.txt ├── [ 11K] erl_mouse_v1-1.py ├── [1.0K] LICENSE └── [1.5K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。