目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2025-8088— WinRAR 安全漏洞

KEV EPSS 8.29% · P92
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2025-8088の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Path traversal vulnerability in WinRAR
ソース: NVD (National Vulnerability Database)
脆弱性説明
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
路径遍历:’…/…//’
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
WinRAR 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
WinRAR是WinRAR公司的一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 WinRAR存在安全漏洞,该漏洞源于路径遍历问题,可能导致任意代码执行。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

Shenlong 10 Questions — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
win.rar GmbHWinRAR 0 ~ 7.12 -

II. CVE-2025-8088の公開POC

#POC説明ソースリンクShenlongリンク
1Python tool for safe archive handling, path traversal awareness, and secure extraction. Inspired by CVE-2025-8088.https://github.com/jordan922/CVE-2025-8088POC詳細
2cve-2025-8088_detectionhttps://github.com/travisbgreen/cve-2025-8088POC詳細
3WinRAR 0day CVE-2025-8088 PoC RAR Archivehttps://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RARPOC詳細
4CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-POC詳細
5Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088https://github.com/onlytoxi/CVE-2025-8088-Winrar-ToolPOC詳細
6Nonehttps://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoCPOC詳細
7Exploit systems using older WinRARhttps://github.com/pentestfunctions/CVE-2025-8088-Multi-DocumentPOC詳細
8Proof-of-Concept for CVE-2025-8088 vulnerability in WinRAR (path traversal via ADS)https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoCPOC詳細
9Nonehttps://github.com/Syrins/CVE-2025-8088-Winrar-Tool-GuiPOC詳細
10🚀 Demonstrate the WinRAR CVE-2025-8088 exploit with a PoC RAR archive that installs a VBScript on startup, showcasing its impact on vulnerable systems.https://github.com/amel-62/WinRAR-CVE-2025-8088-PoC-RARPOC詳細
11This PoC is for authorized study and testing. CVE-2025-8088 is actively exploited, and misuse may violate laws or cause harm. Update to WinRAR 7.13+ to avoid suspicious RARs.https://github.com/ghostn4444/CVE-2025-8088POC詳細
12Nonehttps://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoCPOC詳細
13POWERSHEL script to check if your device is affected or nohttps://github.com/pescada-dev/-CVE-2025-8088POC詳細
14An engaging walkthrough on uncovering, patching, and securing the WinRAR CVE-2025-8088 with a hands-on hacker’s twist.https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-TraversalPOC詳細
15Winrar CVE exploitation before 7.13 using multiple ADS streams on a single file (Custom PDF implementation)https://github.com/pentestfunctions/best-CVE-2025-8088POC詳細
16Nonehttps://github.com/nyra-workspace/CVE-2025-8088POC詳細
17A high-performance, memory-safe implementation of the WinRAR CVE-2025-8088 exploit tool, rewritten in Rust for better reliability and performance.https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-EditionPOC詳細
18Nonehttps://github.com/walidpyh/CVE-2025-8088POC詳細
19Nonehttps://github.com/hexsecteam/CVE-2025-8088-Winrar-ToolPOC詳細
20WinRAR CVE-2025-8088 exploit toolhttps://github.com/cozythrill/CVE-2025-8088POC詳細
21CVE-2025-8088 path traversal toolhttps://github.com/tartalu/CVE-2025-8088POC詳細
22A proof-of-concept exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions 7.12 and lower. This tool creates a malicious RAR archive that embeds payloads in Alternate Data Streams (ADS) with path traversal, potentially leading to arbitrary code execution.https://github.com/techcorp/CVE-2025-8088-ExploitPOC詳細
23CVE-2025-8088https://github.com/nhattanhh/CVE-2025-8088POC詳細
24Nonehttps://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerabilityPOC詳細
25WinRAR漏洞CVE-2025-8088的payload一键生成工具https://github.com/hbesljx/CVE-2025-8088-EXPPOC詳細
26CVE-2025-8088 path traversal toolhttps://github.com/Osinskitito499/CVE-2025-8088POC詳細
27CVE-2025-8088 path traversal toolhttps://github.com/m4nbun/CVE-2025-8088POC詳細
28🚨 Exploit WinRAR CVE-2025-8088 with this PoC RAR archive, demonstrating the vulnerability and its impact when executed on the affected software.https://github.com/pablo388/WinRAR-CVE-2025-8088-PoC-RARPOC詳細
29CVE-2025-8088 exploit C++ implhttps://github.com/lucyna77/winrar-exploitPOC詳細
30CVE-2025-8088 based path traversal toolhttps://github.com/kyomber/CVE-2025-8088POC詳細
31Nonehttps://github.com/Fathi-MO/POC-CVE-2025-8088POC詳細
32CVE-2025-8088 based path traversal toolhttps://github.com/haspread/CVE-2025-8088POC詳細
33CVE-2025-8088 based path traversal toolhttps://github.com/tookATE/CVE-2025-8088POC詳細
34WinRAR 0day CVE-2025-8088 PoC RAR Archivehttps://github.com/Snorx-cyber/CVE-2025-8088-builderPOC詳細
35CVE-2025-8088-BUILDERhttps://github.com/aldisakti2/CVE-2025-8088-BUILDER-Winrar-ToolPOC詳細
36path traversal tool based on cve-2025-8088 https://github.com/blowrrr/cve-2025-8088POC詳細
37A POC exploit for WinRAR vulnerability (CVE-2025-8088) affecting versions 7.12 and lowerhttps://github.com/papcaii2004/CVE-2025-8088-WinRAR-builderPOC詳細
38Path traversal tool based on cve-2025-8088 vulnerabilityhttps://github.com/kaucent/CVE-2025-8088POC詳細
39path traversal tool based on cve 2025 8088 vurnelabilityhttps://github.com/mocred/cve-2025-8088POC詳細
40CVE-2025-8088https://github.com/B1ack4sh/Blackash-CVE-2025-8088POC詳細
41Nonehttps://github.com/nuky-alt/CVE-2025-8088POC詳細
42Path traversal tool based on cve 2025 8088https://github.com/h4vier/cve-2025-8088POC詳細
43Path traversal tool based on cve-2025-8088https://github.com/4daysday/cve-2025-8088POC詳細
44CVE-2025-8088https://github.com/Ashwesker/Blackash-CVE-2025-8088POC詳細
45Nonehttps://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-ToolkitPOC詳細
46🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.https://github.com/Markusino488/cve-2025-8088POC詳細
47CVE 2025 8088https://github.com/vitalichkaa/CVE-2025-8088POC詳細
48Defensive PowerShell tool for static inspection of RAR archives and detection of CVE-2025-8088 path traversal anomalies.https://github.com/ilhamrzr/RAR-Anomaly-InspectorPOC詳細
49Nonehttps://github.com/Ismael-20223/CVE-2025-8088POC詳細
50Herramienta avanzada de explotación transversal de ruta de WinRAR para CVE-2025-8088https://github.com/undefined-name12/CVE-2025-8088-WinrarPOC詳細
51Nonehttps://github.com/IsmaelCosma/CVE-2025-8088POC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2025-8088のインテリジェンス情報

登录查看更多情报信息。

IV. 関連脆弱性

V. CVE-2025-8088へのコメント

まだコメントはありません


コメントを残す