Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32433— Erlang/OTP SSH Vulnerable to Pre-Authentication RCE

CVSS 10.0 · Critical KEV EPSS 47.07% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-32433

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Erlang/OTP SSH Vulnerable to Pre-Authentication RCE
Source: NVD (National Vulnerability Database)
Vulnerability Description
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Erlang/OTP 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Erlang/OTP是Erlang/OTP开源的一个JavaScript编写的处理处理异常的库。该库可以捕捉node.js内置API引发的异常。 Erlang/OTP 27.3.3之前版本存在访问控制错误漏洞,该漏洞源于SSH协议消息处理缺陷,可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
erlangotp >= OTP-27.0-rc1, < OTP-27.3.3 -

II. Public POCs for CVE-2025-32433

#POC DescriptionSource LinkShenlong Link
1https://github.com/vulhub/vulhub/blob/master/erlang/CVE-2025-32433/README.mdPOC Details
2Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-32433.yamlPOC Details
3Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Erlang%20OTP%20SSH%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2025-32433.mdPOC Details
4CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2https://github.com/ProDefense/CVE-2025-32433POC Details
5Nonehttps://github.com/ekomsSavior/POC_CVE-2025-32433POC Details
6Nonehttps://github.com/Epivalent/CVE-2025-32433-detectionPOC Details
7Security research on Erlang/OTP SSH CVE-2025-32433.https://github.com/darses/CVE-2025-32433POC Details
8Missing Authentication for Critical Function (CWE-306)-Exploithttps://github.com/LemieOne/CVE-2025-32433POC Details
9Erlang/OTP SSH 远程代码执行漏洞https://github.com/teamtopkarl/CVE-2025-32433POC Details
10python script to find vulnerable targets of CVE-2025-32433 https://github.com/m0usem0use/erl_mousePOC Details
11Exploitation module for CVE-2025-32433 (Erlang/OTP)https://github.com/exa-offsec/ssh_erlangotp_rcePOC Details
12The vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authentication.https://github.com/omer-efe-curkus/CVE-2025-32433-Erlang-OTP-SSH-RCE-PoCPOC Details
13Nonehttps://github.com/0xPThree/cve-2025-32433POC Details
14Go-based exploit for CVE-2025-32433https://github.com/meloppeitreet/CVE-2025-32433-Remote-ShellPOC Details
15CVE lab to accompany CVE course for CVE-2025-32433https://github.com/ps-interactive/lab_CVE-2025-32433POC Details
16CVE-2025-32433 Erlang/OTP SSH RCE Exploit SSH远程代码执行漏洞EXPhttps://github.com/0x7556/CVE-2025-32433POC Details
17Erlang OTP SSH NSE Discovery Scripthttps://github.com/becrevex/CVE-2025-32433POC Details
18CVE-2025-32433 Summary and Attack Overviewhttps://github.com/MrDreamReal/CVE-2025-32433POC Details
19CVE-2025-32433 is a vuln of sshhttps://github.com/Know56/CVE-2025-32433POC Details
20This script is a custom security tool designed to test for a critical pre-authentication vulnerability in systems running Erlang-based SSH servershttps://github.com/abrewer251/CVE-2025-32433_Erlang-OTP_PoCPOC Details
21This script is a custom security tool designed to test for a critical pre-authentication vulnerability in systems running Erlang-based SSH servershttps://github.com/ODST-Forge/CVE-2025-32433_PoCPOC Details
22 Exploit Erlang/OTP SSH CVE-2025-32433 in a lab setup.https://github.com/C9b3rD3vi1/Erlang-OTP-SSH-CVE-2025-32433POC Details
23CVE-2025-32433 – Erlang/OTP SSH vulnerability allowing pre-auth RCEhttps://github.com/bilalz5-github/Erlang-OTP-SSH-CVE-2025-32433POC Details
24A critical flaw has been discovered in Erlang/OTP's SSH server allows unauthenticated attackers to gain remote code execution. One malformed SSH handshake bypasses authentication and exploits improper handling of SSH protocol messages. https://github.com/vigilante-1337/CVE-2025-32433POC Details
25CVE-2025-32433 Erlang SSH Library Exploit 🛑https://github.com/B1ack4sh/Blackash-CVE-2025-32433POC Details
26Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handlinghttps://github.com/Yuri08loveElaina/CVE-2025-32433-Erlang-OTP-SSH-Pre-Auth-RCE-exploitPOC Details
27CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2https://github.com/platsecurity/CVE-2025-32433POC Details
28CVE-2025-32433 PoC: Unauthenticated Remote Code Execution (RCE) in Erlang/OTP SSH. Includes a vulnerable Docker environment and an interactive Python exploit script for ethical hacking & CTF challenges.https://github.com/NiteeshPujari/CVE-2025-32433-PoCPOC Details
29Nonehttps://github.com/te0rwx/CVE-2025-32433-DetectionPOC Details
30Nonehttps://github.com/Mdusmandasthaheer/CVE-2025-32433POC Details
31PoC showing unauthenticated remote code execution in Erlang/OTP SSH server. By exploiting a flaw in SSH protocol message handling, an attacker can execute arbitrary commands on the target without valid credentials.https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCEPOC Details
32🔍 Explore a working PoC for CVE-2025-32433, demonstrating its impact and providing insights for security professionals and developers.https://github.com/scandijamjam1/CVE-2025-32433POC Details
33testhttps://github.com/iteride/CVE-2025-32433POC Details
34the task from C*****khttps://github.com/mirmeweu/cve-2025-32433POC Details
35These is a PoC for the CVE-2025-32433 vulnerability, do NOT test on systems that you dont own!!!https://github.com/Batman529/PoC-CVE-2025-32433POC Details
36Nonehttps://github.com/toshithh/CVE-2025-32433POC Details
37Nonehttps://github.com/l1nuxkid/CVE-2025-32433-exploitPOC Details
38Erlang/OTP SSHhttps://github.com/radzek15/CVE-2025-32433POC Details
39Erlang/OTP SSH Vulnerable to Pre-Authentication RCEhttps://github.com/soltanali0/CVE-2025-32433-EploitPOC Details
40CVE-2025-32433 Erlang SSH Library Exploit 🛑https://github.com/Ashwesker/Blackash-CVE-2025-32433POC Details
41This exploit script is designed to simplify exploitation of the Erlang/OTP SSH vulnerability CVE-2025-32433 in the TryHackMe lab environment.https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploitPOC Details
42CVE-2025-32433 Erlang SSH Library Exploit 🛑https://github.com/Ashwesker/Ashwesker-CVE-2025-32433POC Details
43Nonehttps://github.com/AntonieSoga/Erlang-OTP-PoC_CVE-2025-32433POC Details
44Nonehttps://github.com/blackcat4347/CVE-2025-32433-available-for-windowsPOC Details
45Nonehttps://github.com/carlosalbertotuma/CVE-2025-32433POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-32433

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-32433

No comments yet


Leave a comment