关联漏洞
描述
POWERSHEL script to check if your device is affected or no
介绍
# -CVE-2025-8088
POWERSHEL script to check if your device is affected or no
🚨 CVE-2025-8088: WinRAR Zero-Day Alert! 🚨
A critical WinRAR vulnerability (CVE-2025-8088) is making headlines – attackers can exploit this flaw in versions < 7.13 to execute malicious code just by tricking users into opening a crafted archive. Impact? Full system compromise.
✅ Patched in 7.13+ → If you’re running anything older, you’re a target.
💡 I’ve built a PowerShell script to help you detect exposure instantly:
✔ Finds WinRAR on your system
✔ Checks version
✔ Tells you if you’re safe or exploitable
🚨IF THE FILE DIDNT WORK FOR POLICY PROBLEM USE THIS COMMAND BEFORE RUNNING THE SECRIPT:
Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process
RUNNING SCRIPT:
.\checker.ps1
文件快照
[4.0K] /data/pocs/d64b78f842d41efdd71c0ea1c78ef04c66b1e4c7
├── [1.1K] checker.ps1
└── [ 801] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。