Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24071 PoC — Microsoft Windows File Explorer Spoofing Vulnerability

Source
Associated Vulnerability
Title:Microsoft Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
Description:Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Description
Exploit CVE-2025-24071
Readme
# CVE-2025-24071-Exploit

   - Đây chỉ là tài liệu mang tính chất học tập. Chỉ xem tham khảo và đừng làm phiền chính quyền.
   - This content is for educational purposes only. Use for reference only and do not contact the police.

## Vulnerability Details

- **CVE ID**: CVE-2025-24071
- **Vulnerable System**: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File

## Env

- **JDK**: 22
  
## Attack
- **Attacker**: run poc with ip attacker to gen file exploit.zip
- **Attacker**: sudo responder -I eth0 -v
- **Victim**: Extraction file exploit.zip
File Snapshot

[4.0K] /data/pocs/4c2c08d73b6c25f59d7ce5fca862c39249f42c6c ├── [2.3K] Exploit.java └── [ 584] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →