关联漏洞
            
        
            描述
            POWERSHEL script to check if your device is affected or no
        
        
            介绍
            # -CVE-2025-8088
POWERSHEL script to check if your device is affected or no
🚨 CVE-2025-8088: WinRAR Zero-Day Alert! 🚨
A critical WinRAR vulnerability (CVE-2025-8088) is making headlines – attackers can exploit this flaw in versions < 7.13 to execute malicious code just by tricking users into opening a crafted archive. Impact? Full system compromise.
✅ Patched in 7.13+ → If you’re running anything older, you’re a target.
💡 I’ve built a PowerShell script to help you detect exposure instantly:
 ✔ Finds WinRAR on your system
 ✔ Checks version
 ✔ Tells you if you’re safe or exploitable
🚨IF THE FILE DIDNT WORK FOR POLICY PROBLEM USE THIS COMMAND BEFORE RUNNING THE SECRIPT:
Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process
RUNNING SCRIPT:
.\checker.ps1
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/d64b78f842d41efdd71c0ea1c78ef04c66b1e4c7
├── [1.1K]  checker.ps1
└── [ 801]  README.md
0 directories, 2 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。