Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-24035 PoC β€” Windows Remote Desktop Services Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2025-24035)
Description:Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
Description
πŸ›‘οΈ Safe simulation for CVE-2025-24035 to test RD Gateway WebSocket handling with oversized headers.
Readme
# CVE-2025-24035 WebSocket Stress Test (Safe)

🚨 **DISCLAIMER**: This is NOT an exploit. This script is a simulation and should only be used for educational purposes in a safe lab environment.

## Purpose

This test sends a deliberately oversized WebSocket header to simulate a malformed request toward RD Gateway services (such as those affected by CVE-2025-24035).

## Legal

⚠️ Do not use this against systems without explicit authorization. Unauthorized use may be illegal.

## Usage

```bash
python3 test_abnormal_rds_websocket.py
```

Edit the IP address in the script according to your local lab setup.
File Snapshot

[4.0K] /data/pocs/bd701863f29668282182bc6d083dcc79dcb76123 β”œβ”€β”€ [ 242] LICENSE β”œβ”€β”€ [ 617] README.md └── [1.0K] test_abnormal_rds_websocket.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’