## https://sploitus.com/exploit?id=B8F6B314-8028-5568-A2A7-4AA3A6141AFF
# CVE-2025-33053 - WebDAV Remote Code Execution (RCE) PoC & C2 Simulation
> **β οΈ Educational Purposes Only**
> This project demonstrates a proof-of-concept exploiting WebDAV and `.url` file delivery to achieve realistic remote code execution. It includes a decoy-based executable and a controlled simulation of command-and-control (C2) capabilities. No malicious payloads are shared.
---
## π Summary
This repository contains a PoC for **CVE-2025-33053**, a vulnerability in how Windows handles `.url` files pointing to a WebDAV share. The PoC demonstrates how an attacker could:
* Deliver a `.url` shortcut via ZIP (`Invoice.pdf.zip`)
* Trigger execution of a payload hosted on a WebDAV container
* Open a benign-looking PDF while executing malicious logic in the background
* Optionally simulate C2 behavior (e.g., creating folders)
> The actual C2 code is **not included** only a demonstration video is provided.
---
## π¬ Demo Videos
### πΉ Video 1 β Decoy Execution
https://github.com/user-attachments/assets/27ada7f9-9b02-4281-b002-da7afcdffe21
Shows the `.url` file triggering `route.exe`, which opens a fake PDF and displays a popup:
> *"Execution complete. No alerts triggered. You may continue pretending you're safe."*
### πΉ Video 2 β C2 Simulation
https://github.com/user-attachments/assets/d3908eb7-3126-4ec1-ae60-a0373b877a50
Very simple command and control mechanism. Simulates a stealthy C2 by executing remote commands (e.g., creating a folder and calc) fetched via HTTP. No shell, no noise just silent control.
Reverse shells get captured and stopped by the Microsoft Defender. Here as you can see I just edit a file which is accessible to the victim machine and it will be fetched by the machine via http; strip the content then executed. that task is handled by that custom Route.exe
> β Videos available in the `demo/` directory.
---
## π File Structure
```
CVE-2025-33053/
βββ docker-compose.yml # WebDAV container config
βββ setup_webdav_payload.py # Automates setup + zipping
βββ Important-Document.pdf.zip # Contains disguised .url ( After the script )
βββ webdav_data/ # ( After the script )
β βββ data/payload/route.exe # Payload (PDF + logic)
βββ cleanup.sh # Docker + Directories + webdav_data cleaner
βββ demo/
β βββ 1_decoy_execution.mp4
β βββ 2_c2_simulation.mp4
```
---
## π§ͺ Running the PoC
1. **Clone the repo & navigate to it**
```bash
git clone https://github.com/kra1t0/CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept.git
cd CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept
```
2. **Run setup script**
```bash
python3 setup_webdav_payload.py
```
> This sets up Docker, creates folders, Moves the pwned.exe, generates `.url`, and packages the `.zip`
4. **Deliver the ZIP and open on target**
* `Invoice.pdf.zip` β user opens / Unzips and double-clicks `.url`
* Execution begins from WebDAV without any warnings
( Sometimes the Microsoft Defender does alert you that this file should be scanned by the admin. )
---
## π§± Affected Versions
CVE-2025-33053 affects the following Windows versions:
Windows 10 (1809 β 22H2)
Windows 11 (21H2 β 23H2)
Windows Server 2016 / 2019 / 2022
Systems with WebClient service enabled
Systems where .url files are not blocked or sanitized
**π οΈ The vulnerability was patched in June 2025 cumulative updates.
You can find [patch links](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053) in the Microsoft Patch Notes.**
## π§ How It Works
1. **The Shortcut Trick**Β The `.url` file launches a trusted Windows utility (`iediagcmd.exe`) but sets its working directory to an attacker-controlled WebDAV share.
2. **DLL/Executable Hijack**Β That utility uses `Process.Start()` to run commands like `route.exe`. Windows looks first in the working directory, allowing the malicious binary from WebDAV to be executed.
3. **Stealth Falconβs Delivery**Β In real attacks, APT actors zipped the `.url` into misleadingly named archives (e.g. `...pdf.zip`) and hosted them on trusted domains over HTTPS. The payload chain then delivered a decoy PDF and loaded a custom C2 loader (βHorus Agentβ) capable of in-memory shellcode injection, process cloaking, and remote commands.
4. **Active Exploitation.**Β The exploit was used in March 2025 against defense organizations in the Middle East. Itβs high-impact (CVSS 8.8) and included in CISAβs Known Exploited Vulnerabilities catalog.
---
## π‘οΈ Mitigation & Defense
| Mitigation Strategy | Description |
| ----------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------- |
| **π Apply Microsoft Patch** | June 2025 cumulative updates address CVEβ2025β33053 across Windows 10/11 and older Server versions. |
| **π Disable WebDAV Client** | For systems without WebDAV needs (i.e. most modern setups), disable the βWebClientβ service via Group Policy or registry. |
| **π₯ Train Users to Avoid Suspicious Archives** | Donβt open `.url` files from ZIP/ISO emails, even if they appear document-like. |
| **π΅οΈββοΈ Monitor WebDAV Traffic** | Look for outbound UNC connection patterns like `\\<host>@443\DavWWWRoot\...` these may indicate exploitation attempts. |
| **π Deploy WAF/IDS Rules** | Block WebDAV-related methods (e.g., `PROPFIND`) or UNC paths to untrusted domains. |
| **βοΈ Harden Edge/SmartScreen Policies** | Restrict handling of `.url` files and archives via browser settings or secure email gateways. |
> β **Immediate priority**: install the patch β CISA requires federal agencies to remediate by July 1, 2025
---
## β Whatβs NOT Included
* No C2 command server code
* No reverse shell scripts or malware
* No exploitation of real systems
---
## π References
* [Microsoft Patch Notes β June 2025](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053)
* [CISA KEV Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
* [Elastic Threat Report: Stealth Falcon Exploitation](https://www.elastic.co/blog/stealth-falcon-campaign-2025)
* [CERT-EU Alert](https://cert.europa.eu/article/webdav-url-hijack-apt)
* [Microsoft Defender AV & SmartScreen Advisory](https://learn.microsoft.com/en-us/microsoft-365/security/)
---
Crafted with attention to realism, red team tradecraft, and ethical disclosure by [@kra1t0](https://github.com/kra1t0)
*Precision in Chaos*