exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/46756
This Metasploit module exploits CVE-2018-20250, a path traversal vulnerability in WinRAR's ACE format handling (UNACEV2.dll). It crafts a malicious ACE file to extract a payload to the user's startup folder, achieving remote code execution upon system restart.
Classification
Working Poc 100%
Target:
WinRAR <= 5.61
No auth needed
Prerequisites:
User must extract the RAR file from a subdirectory within their profile folder (e.g., Desktop or Downloads) · Victim must restart the system for payload execution
exploitdb
WORKING POC
VERIFIED
by WyAtu · pythonlocalwindows
https://www.exploit-db.com/exploits/46552
This exploit generates a malicious RAR archive that leverages CVE-2018-20250 to achieve arbitrary file write during extraction, allowing execution of an evil file (e.g., calc.exe) in the Windows Startup folder. The PoC manipulates ACE header CRC values and file paths to bypass security checks.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
WinRAR installed on victim machine · Victim must extract the malicious archive
nomisec
WORKING POC
495 stars
by WyAtu · client-side
https://github.com/WyAtu/CVE-2018-20250
This repository contains a Python-based exploit for CVE-2018-20250, which leverages a path traversal vulnerability in WinRAR to achieve arbitrary code execution. The exploit generates a malicious RAR archive that, when extracted, places an executable in the Windows Startup folder.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Python 3.7 · acefile.py library · malicious executable (e.g., calc.exe)
nomisec
WORKING POC
26 stars
by QAX-A-Team · poc
https://github.com/QAX-A-Team/CVE-2018-20250
This repository contains a pure Python implementation for reading and extracting ACE archives, which can be used to test or exploit CVE-2018-20250-20253 vulnerabilities in WinAce. The code includes a template for 010 Editor and a demo GIF.
Classification
Working Poc 90%
Target:
WinAce 2.69
No auth needed
Prerequisites:
Victim must open a maliciously crafted ACE archive
nomisec
WORKING POC
21 stars
by easis · client-side
https://github.com/easis/CVE-2018-20250-WinRAR-ACE
This repository contains a C# implementation for generating malicious ACE archives to exploit CVE-2018-20250, a path traversal vulnerability in WinRAR. The PoC constructs ACE file headers with arbitrary extract paths, enabling arbitrary file writes during extraction.
Classification
Working Poc 90%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Ability to deliver a malicious ACE archive to the target · Target user must extract the archive using WinRAR
nomisec
WORKING POC
7 stars
by arkangel-dev · poc
https://github.com/arkangel-dev/CVE-2018-20250-WINRAR-ACE-GUI
This repository contains a proof-of-concept exploit for CVE-2018-20250, a WinRAR ACE archive directory traversal vulnerability. The code demonstrates how to craft a malicious ACE file to achieve arbitrary file write during extraction.
Classification
Working Poc 90%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Victim must extract a malicious ACE archive using WinRAR
nomisec
WORKING POC
2 stars
by Ektoplasma · client-side
https://github.com/Ektoplasma/ezwinrar
This Python tool exploits CVE-2018-20250 in WinRAR by crafting ACE archives with manipulated filenames to achieve arbitrary file write, leading to code execution via startup folder placement. It automates the creation of malicious ACE files using WinACE.
Classification
Working Poc 95%
Target:
WinRAR (via WinACE ACE format handling)
No auth needed
Prerequisites:
WinACE executable · Victim interaction to extract archive
nomisec
WORKING POC
2 stars
by STP5940 · client-side
https://github.com/STP5940/CVE-2018-20250
This repository contains a pure Python implementation for reading and extracting ACE archives, which can be used to exploit CVE-2018-20250, a path traversal vulnerability in WinRAR. The exploit leverages the ACE archive format to extract files to arbitrary locations.
Classification
Working Poc 90%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Ability to deliver a malicious ACE archive to the target system
nomisec
WORKING POC
1 stars
by eastmountyxz · poc
https://github.com/eastmountyxz/CVE-2018-20250-WinRAR
This repository contains a Python-based proof-of-concept exploit for CVE-2018-20250, which targets a path traversal vulnerability in WinRAR. The exploit leverages a maliciously crafted ACE archive to extract files to arbitrary locations on the system.
Classification
Working Poc 90%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Victim must extract the maliciously crafted ACE archive using a vulnerable version of WinRAR
nomisec
WORKING POC
1 stars
by technicaldada · client-side
https://github.com/technicaldada/hack-winrar
This repository contains a Python-based exploit for CVE-2018-20250, an absolute path traversal vulnerability in WinRAR. The exploit generates a malicious RAR archive that, when extracted, places an executable in the Windows Startup folder for persistence.
Classification
Working Poc 95%
Target:
WinRAR versions prior to February 2019
No auth needed
Prerequisites:
Python 3.7 · acefile.py utility · malicious executable (e.g., calc.exe)
gitlab
WORKING POC
by gavz · client-side
https://gitlab.com/gavz/CVE-2018-20250-WinRAR-ACE
This repository contains a functional proof-of-concept exploit for CVE-2018-20250, which targets a path traversal vulnerability in WinRAR's handling of ACE archives. The code constructs malicious ACE file headers to achieve arbitrary file write during extraction.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
WinRAR installed on target system · Ability to deliver malicious ACE archive to victim
nomisec
WORKING POC
by LamSonBinh · client-side
https://github.com/LamSonBinh/CVE-2018-20250
This repository contains a working exploit for CVE-2018-20250, a vulnerability in WinRAR that allows arbitrary code execution via a crafted ACE archive. The exploit uses a Python script to generate a malicious archive and a Meterpreter reverse shell payload.
Classification
Working Poc 95%
Target:
WinRAR 5.50 32-bit
No auth needed
Prerequisites:
WinRAR 5.50 32-bit installed on target · Network connectivity to attacker's machine
nomisec
WORKING POC
by tannlh · client-side
https://github.com/tannlh/CVE-2018-20250
This repository contains a working exploit for CVE-2018-20250, a vulnerability in WinRAR that allows arbitrary code execution via a crafted ACE archive. The exploit uses a Python script to generate a malicious ACE file and a Meterpreter reverse shell payload.
Classification
Working Poc 90%
Target:
WinRAR 5.50 (32-bit)
No auth needed
Prerequisites:
WinRAR 5.50 (32-bit) installed on target · Network connectivity for reverse shell
nomisec
WORKING POC
by tzwlhack · client-side
https://github.com/tzwlhack/CVE-2018-20250
This repository contains a Python-based exploit for CVE-2018-20250, which leverages a path traversal vulnerability in WinRAR to achieve arbitrary file write and remote code execution. The exploit generates a malicious RAR archive that, when extracted, places an executable in the Windows Startup folder.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Python 3.7 · acefile.py library · malicious executable (e.g., calc.exe)
nomisec
WORKING POC
by zeronohacker · poc
https://github.com/zeronohacker/CVE-2018-20250
This repository contains a modified version of the acefile library, which is a pure Python implementation for reading and extracting ACE archives. The modification appears to address CVE-2018-20250, a vulnerability in WinRAR that allows arbitrary code execution via crafted ACE archives.
Classification
Working Poc 90%
Target:
WinRAR (versions prior to 5.70 beta 1)
No auth needed
Prerequisites:
Victim must open a malicious ACE archive with a vulnerable version of WinRAR
nomisec
STUB
by lxg5763 · poc
https://github.com/lxg5763/cve-2018-20250
The repository appears to be a stub or placeholder for a CVE-2018-20250 exploit, generated by a Microsoft application wizard. It lacks functional exploit code and primarily contains boilerplate MFC (Microsoft Foundation Class) application files.
Target:
Unknown (likely placeholder for a Microsoft product)
No auth needed
nomisec
WORKING POC
by likekabin · poc
https://github.com/likekabin/CVE-2018-20250
This repository contains a Python-based exploit for CVE-2018-20250, which leverages a path traversal vulnerability in WinRAR to achieve arbitrary file write and subsequent code execution. The exploit generates a malicious RAR archive that, when extracted, places an executable in the Windows Startup folder.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Python 3.7 · acefile.py library · malicious executable (e.g., calc.exe)
nomisec
WORKING POC
by H4xl0r · remote
https://github.com/H4xl0r/WinRar_ACE_exploit_CVE-2018-20250
This repository contains a Python-based exploit for CVE-2018-20250, which leverages a path traversal vulnerability in WinRAR's handling of ACE archives to achieve arbitrary code execution by placing a malicious executable in the Windows Startup folder.
Classification
Working Poc 95%
Target:
WinRAR <= 5.60
No auth needed
Prerequisites:
Victim must extract the malicious ACE archive using a vulnerable version of WinRAR · Malicious executable must be placed in the Startup folder for persistence
nomisec
SCANNER
by joydragon · poc
https://github.com/joydragon/Detect-CVE-2018-20250
This repository contains a bash script to detect and extract malicious payloads from ACE archives exploiting CVE-2018-20250, a WinRAR vulnerability. It checks for specific strings and file structures indicative of the exploit.
Classification
Scanner 90%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
ACE archive file potentially exploiting CVE-2018-20250 · acefile-unace for payload extraction
nomisec
WORKING POC
by AeolusTF · client-side
https://github.com/AeolusTF/CVE-2018-20250
This repository contains a Python-based exploit for CVE-2018-20250, which leverages a path traversal vulnerability in WinRAR to achieve arbitrary file write and remote code execution. The exploit generates a malicious RAR archive that extracts an executable to the Windows Startup folder.
Classification
Working Poc 95%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Python 3.7 · acefile.py library · malicious executable (e.g., calc.exe)
nomisec
WRITEUP
by blunden · poc
https://github.com/blunden/UNACEV2.DLL-CVE-2018-20250
This repository contains a patched version of UNACEV2.DLL to address CVE-2018-20250, a WinRAR vulnerability. It does not include exploit code but provides a mitigated binary.
Classification
Writeup 90%
Target:
WinRAR (UNACEV2.DLL)
No auth needed
Prerequisites:
Access to the vulnerable system
nomisec
WRITEUP
by nmweizi · poc
https://github.com/nmweizi/CVE-2018-20250-poc-winrar
This repository contains a README with a screenshot related to CVE-2018-20250, a WinRAR vulnerability. No exploit code or technical details are provided in the snippet.
Classification
Writeup 90%
Target:
WinRAR (version not specified)
No auth needed
Prerequisites:
WinRAR installation
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/winrar_ace.rb
This Metasploit module exploits a path traversal vulnerability in WinRAR's ACE format handling (CVE-2018-20250) to achieve remote code execution by extracting a payload to the user's startup folder. The exploit crafts a malicious ACE file with a manipulated filename field to bypass destination folder validation.
Classification
Working Poc 100%
Target:
RARLAB WinRAR <= 5.61
No auth needed
Prerequisites:
User must extract the malicious RAR file from a subfolder within their profile directory (e.g., Desktop or Downloads) · User restart required for payload execution