nomisec
WORKING POC
139 stars
by ProDefense · poc
https://github.com/ProDefense/CVE-2025-32433
This PoC exploits CVE-2025-32433, a pre-authentication SSH vulnerability, by sending malformed SSH packets to trigger arbitrary file writes on the target system. The exploit constructs SSH_MSG_KEXINIT, SSH_MSG_CHANNEL_OPEN, and SSH_MSG_CHANNEL_REQUEST packets to bypass authentication and execute a file write command.
Classification
Working Poc 95%
Target:
SSH server (specific version not specified in PoC)
No auth needed
Prerequisites:
Network access to the target SSH server · Target SSH server must be vulnerable to CVE-2025-32433
nomisec
WORKING POC
15 stars
by omer-efe-curkus · remote
https://github.com/omer-efe-curkus/CVE-2025-32433-Erlang-OTP-SSH-RCE-PoC
This repository contains a functional PoC exploit for CVE-2025-32433, an unauthenticated RCE vulnerability in Erlang/OTP SSH server. The exploit leverages flawed SSH protocol message handling to execute arbitrary commands or spawn a reverse shell.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH server (OTP-27.3.2 and earlier, OTP-26.2.5.10 and earlier, OTP-25.3.2.19 and earlier)
No auth needed
Prerequisites:
Network access to the target SSH server · Target running a vulnerable version of Erlang/OTP
github
WORKING POC
7 stars
by TeneBrae93 · pythonremote
https://github.com/TeneBrae93/CVE-2025-3243
This repository contains a functional Python exploit for CVE-2025-32433, targeting a vulnerability in Erlang's SSH library. The exploit sends a malformed SSH_MSG_CHANNEL_REQUEST packet to achieve pre-authenticated remote code execution via an Erlang payload.
Classification
Working Poc 95%
Target:
Erlang SSH library
No auth needed
Prerequisites:
Python 3 · Netcat listener · Network access to target SSH service
nomisec
WORKING POC
6 stars
by NiteeshPujari · remote
https://github.com/NiteeshPujari/CVE-2025-32433-PoC
This repository contains a functional Proof-of-Concept (PoC) for CVE-2025-32433, an unauthenticated Remote Code Execution (RCE) vulnerability in Erlang/OTP SSH server. The exploit leverages improper SSH protocol sequence enforcement to execute arbitrary Erlang commands without authentication.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH server (versions OTP-27.3.2 and earlier, OTP-26.2.5.10 and earlier, OTP-25.3.2.19 and earlier)
No auth needed
Prerequisites:
Network access to the target SSH server · Erlang/OTP SSH server running a vulnerable version
nomisec
SCANNER
5 stars
by m0usem0use · poc
https://github.com/m0usem0use/erl_mouse
This repository contains a Python script designed to scan CIDR blocks for vulnerable Erlang/OTP SSH servers affected by CVE-2025-32433. It uses Masscan for initial discovery and parses banners to identify vulnerable versions.
Classification
Scanner 90%
Target:
Erlang/OTP SSH servers
No auth needed
Prerequisites:
Python3 · Masscan · china_ip_ranges.txt file for China scans
nomisec
WORKING POC
5 stars
by 0xPThree · remote
https://github.com/0xPThree/cve-2025-32433
This repository contains a functional exploit for CVE-2025-32433, targeting an Erlang OTP SSH server. The exploit establishes an SSH connection, sends a crafted payload to execute arbitrary commands, and demonstrates a reverse shell.
Classification
Working Poc 95%
Target:
Erlang OTP SSH server (version not specified)
No auth needed
Prerequisites:
Network access to the target SSH server · Python 3.x environment
nomisec
WORKING POC
4 stars
by ekomsSavior · remote
https://github.com/ekomsSavior/POC_CVE-2025-32433
This repository contains a functional PoC for CVE-2025-32433, an Erlang/OTP SSH pre-authentication RCE vulnerability. The exploit sends a crafted SSH packet to trigger a reverse shell and simulates post-exploitation activities.
Classification
Working Poc 90%
Target:
Erlang/OTP SSH
No auth needed
Prerequisites:
Target with vulnerable Erlang/OTP SSH service exposed on port 22 · Network connectivity to the target
nomisec
WORKING POC
3 stars
by 0x7556 · poc
https://github.com/0x7556/CVE-2025-32433
This repository contains a proof-of-concept exploit for CVE-2025-32433, an unauthenticated remote code execution vulnerability in Erlang/OTP SSH server. The exploit allows arbitrary command execution and reverse shell initiation.
Classification
Working Poc 90%
Target:
Erlang/OTP SSH server (OTP-27.3.2 and earlier, OTP-26.2.5.10 and earlier, OTP-25.3.2.19 and earlier)
No auth needed
Prerequisites:
Network access to the target SSH server · Target running a vulnerable version of Erlang/OTP
nomisec
WORKING POC
3 stars
by darses · poc
https://github.com/darses/CVE-2025-32433
This repository contains a Python-based Proof-of-Concept exploit for CVE-2025-32433, targeting an unauthenticated Remote Code Execution vulnerability in Erlang/OTP SSH. The exploit uses Paramiko to establish an SSH connection and execute arbitrary commands via the `os:cmd` function.
Classification
Working Poc 90%
Target:
Erlang/OTP SSH
No auth needed
Prerequisites:
Network access to the target SSH server · Erlang/OTP SSH server running on the target
nomisec
WORKING POC
3 stars
by dollarboysushil · remote
https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
This is a functional exploit for CVE-2025-32433, an unauthenticated RCE vulnerability in Erlang/OTP SSH server. It crafts malicious SSH protocol messages to execute arbitrary commands, specifically a reverse shell, without authentication.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH server (OTP-27.3.3 and earlier, OTP-26.2.5.11 and earlier, OTP-25.3.2.20 and earlier)
No auth needed
Prerequisites:
Network access to the target SSH port · Listener setup for reverse shell
nomisec
WORKING POC
3 stars
by exa-offsec · remote
https://github.com/exa-offsec/ssh_erlangotp_rce
This is a Metasploit module that exploits CVE-2025-32433, a pre-authentication RCE vulnerability in Erlang-based SSH servers. It crafts malicious SSH packets to execute commands via the Erlang `os:cmd` function, establishing a reverse shell.
Classification
Working Poc 95%
Target:
Erlang OTP SSH server (pre-auth)
No auth needed
Prerequisites:
Network access to target SSH port (default 22) · Vulnerable Erlang OTP SSH service
nomisec
SUSPICIOUS
3 stars
by LemieOne · poc
https://github.com/LemieOne/CVE-2025-32433
The repository claims to provide an exploit for CVE-2025-32433, a critical RCE vulnerability in Erlang/OTP SSH, but contains no actual exploit code. Instead, it directs users to an external download link (tinyurl.com) and provides vague, marketing-like descriptions without technical details.
Classification
Suspicious 95%
Target:
Erlang/OTP SSH
No auth needed
Prerequisites:
SSH daemon running as root
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-32433
This repository contains functional exploit code for multiple CVEs, including authentication bypass vulnerabilities in TOTOLINK devices and a scanner for Fortinet SSL VPN (CVE-2024-21762). The PoCs demonstrate the vulnerabilities with clear technical details and functional code.
Classification
Working Poc 90%
Target:
TOTOLINK LR350, TOTOLINK T6, Fortinet SSL VPN
No auth needed
Prerequisites:
network access to the target device
nomisec
WORKING POC
2 stars
by mirmeweu · remote
https://github.com/mirmeweu/cve-2025-32433
This repository contains a proof-of-concept exploit for CVE-2025-32433, a pre-authentication remote code execution vulnerability in the Erlang/OTP SSH server. The exploit leverages DNS out-of-band techniques to confirm vulnerability and includes both Python and Go implementations for mass scanning.
Classification
Working Poc 90%
Target:
Erlang/OTP SSH Server (versions 25.3.2, 26.2.5.11, 27.3.2)
No auth needed
Prerequisites:
Network access to the target SSH server · DNS out-of-band channel for confirmation
nomisec
SCANNER
2 stars
by Yuri08loveElaina · remote
https://github.com/Yuri08loveElaina/CVE-2025-32433-Erlang-OTP-SSH-Pre-Auth-RCE-exploit
The repository contains a scanner for CVE-2025-32433, an Erlang/OTP SSH Pre-Auth RCE vulnerability. The exploit logic is a placeholder and does not demonstrate a working RCE, but the scanner checks for vulnerable banners.
Classification
Scanner 70%
Target:
Erlang/OTP SSH
No auth needed
Prerequisites:
Network access to the target SSH service
github
WORKING POC
1 stars
by toshithh · pythonremote
https://github.com/toshithh/CVE-2025-32433
This exploit targets an SSH server vulnerability (CVE-2025-32433) by sending a crafted SSH_MSG_CHANNEL_REQUEST with a malicious command payload to achieve remote code execution. The PoC constructs SSH protocol packets to bypass authentication and execute a reverse shell command.
Classification
Working Poc 95%
Target:
SSH server (likely OpenSSH or a derivative)
No auth needed
Prerequisites:
Network access to the target SSH server · SSH server listening on the specified port
nomisec
WORKING POC
1 stars
by AntonieSoga · poc
https://github.com/AntonieSoga/Erlang-OTP-PoC_CVE-2025-32433
This PoC demonstrates CVE-2025-32433, an authentication bypass in Erlang/OTP SSH allowing pre-authentication command execution via improper SSH protocol state handling.
Classification
Working Poc 100%
Target:
Erlang/OTP SSH (versions before OTP-27.3.2, OTP-26.2.5.10, OTP-25.3.2.19)
No auth needed
Prerequisites:
Network access to vulnerable Erlang/OTP SSH server · SSH daemon reachable and configured with password-based authentication
nomisec
WORKING POC
1 stars
by bilalz5-github · poc
https://github.com/bilalz5-github/Erlang-OTP-SSH-CVE-2025-32433
This PoC demonstrates CVE-2025-32433 by sending an SSH message with ID 80 (reserved for post-auth) during the pre-auth phase, proving the Erlang/OTP SSH server processes invalid messages. The exploit confirms vulnerable behavior but does not include a full RCE payload.
Classification
Working Poc 90%
Target:
Erlang/OTP SSH (OTP-27.3.2 and below, OTP-26.2.5.10 and below, OTP-25.3.2.19 and below)
No auth needed
Prerequisites:
Network access to the target SSH server · Erlang/OTP SSH server running a vulnerable version
nomisec
STUB
1 stars
by Know56 · poc
https://github.com/Know56/CVE-2025-32433
The repository contains a minimal Python script that attempts to establish a socket connection to a specified host and port, then sends a user-provided command. However, it lacks any vulnerability-specific logic or exploitation mechanism for CVE-2025-32433.
Target:
unknown
No auth needed
Prerequisites:
network access to target host and port
nomisec
WORKING POC
1 stars
by iteride · remote
https://github.com/iteride/CVE-2025-32433
This PoC exploits CVE-2025-32433, a pre-authentication RCE vulnerability in Erlang/OTP's SSH implementation. It crafts malicious SSH packets to execute arbitrary commands (e.g., file writes) without authentication.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH (versions 25.3.2.20 and below, 26.2.5.11 and below, 27.3.3 and below)
No auth needed
Prerequisites:
Network access to vulnerable Erlang/OTP SSH server (default or custom port) · SSH service exposed and running on target
nomisec
WORKING POC
1 stars
by teamtopkarl · remote
https://github.com/teamtopkarl/CVE-2025-32433
This PoC exploits a pre-authentication RCE vulnerability in Erlang/OTP SSH servers by sending maliciously crafted SSH protocol messages. It constructs SSH_MSG_KEXINIT, SSH_MSG_CHANNEL_OPEN, and SSH_MSG_CHANNEL_REQUEST packets to execute a reverse shell command.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH server (all versions)
No auth needed
Prerequisites:
Network access to the target SSH server · Target must be running a vulnerable Erlang/OTP SSH server
nomisec
WORKING POC
1 stars
by joshuavanderpoll · poc
https://github.com/joshuavanderpoll/cve-2025-32433
The repository contains a Go-based exploit for CVE-2025-32433, with a GitHub Actions workflow for building cross-platform binaries. The presence of a Docker setup suggests it includes a test environment for the vulnerability.
Classification
Working Poc 90%
Target:
Unknown (CVE-2025-32433)
No auth needed
Prerequisites:
Go environment · Docker (for testing)
nomisec
WORKING POC
1 stars
by yonathanpy · remote
https://github.com/yonathanpy/CVE-2025-32433.py
This repository contains a functional Python PoC for CVE-2025-32433, demonstrating an SSH protocol exploit that sends crafted SSH messages (KEXINIT, CHANNEL_OPEN, CHANNEL_REQUEST) to trigger a pre-authentication vulnerability. The exploit targets an Erlang/OTP SSH server and attempts to write a file via a malformed 'exec' request.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH server (OTP-26.2.5.10)
No auth needed
Prerequisites:
Network access to target SSH server · SSH server running vulnerable Erlang/OTP version
github
WORKING POC
by accuknox · pythonpoc
https://github.com/accuknox/CVE-PoC-Collection/tree/main/CVE-2025-32433
This repository contains a functional exploit PoC for CVE-2025-32433, demonstrating a remote code execution (RCE) vulnerability. The exploit leverages a malicious IPP server to deliver a payload via CUPS' browsed protocol, targeting vulnerable CUPS instances.
Classification
Working Poc 95%
Target:
CUPS (Common Unix Printing System)
No auth needed
Prerequisites:
Network access to the target CUPS instance · CUPS browsed protocol enabled on the target
nomisec
WRITEUP
by C9b3rD3vi1 · poc
https://github.com/C9b3rD3vi1/Erlang-OTP-SSH-CVE-2025-32433
This repository contains a README describing CVE-2025-32433, a critical unauthenticated RCE vulnerability in Erlang/OTP SSH. No exploit code is present, only a detailed writeup about the vulnerability and its context.
Classification
Writeup 90%
Target:
Erlang/OTP SSH (version not specified)
No auth needed
Prerequisites:
Vulnerable Erlang/OTP SSH implementation
nomisec
SCANNER
by te0rwx · poc
https://github.com/te0rwx/CVE-2025-32433-Detection
This repository provides a YARA rule for detecting exploits and scanners targeting CVE-2025-32433, an Erlang SSH remote code execution vulnerability. It focuses on identifying reverse shells, obfuscated payloads, and scanner patterns with minimal false positives.
Classification
Scanner 90%
Target:
Erlang SSH (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable Erlang SSH service
nomisec
WORKING POC
by meloppeitreet · remote
https://github.com/meloppeitreet/CVE-2025-32433-Remote-Shell
This Go-based exploit leverages CVE-2025-32433, a pre-authentication RCE vulnerability in SSH protocol handling, by bypassing authentication and sending malicious payloads via SSH_MSG_CHANNEL_REQUEST. It supports both direct command execution and reverse shell establishment.
Classification
Working Poc 95%
Target:
SSH servers (likely Erlang OTP-based implementations)
No auth needed
Prerequisites:
Network access to target SSH port · Vulnerable SSH server version
nomisec
WORKING POC
by ps-interactive · remote
https://github.com/ps-interactive/lab_CVE-2025-32433
This repository contains a working PoC for CVE-2025-32433, an unauthenticated RCE vulnerability in Erlang/OTP SSH. The exploit sends malformed SSH packets to execute arbitrary Erlang commands pre-authentication.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH
No auth needed
Prerequisites:
Network access to the target SSH service · Target running vulnerable Erlang/OTP SSH
nomisec
WORKING POC
by MrDreamReal · remote
https://github.com/MrDreamReal/CVE-2025-32433
This is a functional exploit for CVE-2025-32433, targeting an unauthenticated RCE vulnerability in Erlang/OTP SSH servers. It sends malformed SSH protocol messages to execute arbitrary Erlang code, resulting in a reverse shell.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH server (versions below OTP-27.3.3, OTP-26.2.5.11, or OTP-25.3.2.20)
No auth needed
Prerequisites:
Network access to vulnerable Erlang/OTP SSH server · Python 3 environment
nomisec
WORKING POC
by abrewer251 · remote
https://github.com/abrewer251/CVE-2025-32433_Erlang-OTP_PoC
This PoC exploits a pre-authentication RCE vulnerability in Erlang-based SSH servers (CVE-2025-32433) by emulating the SSH protocol, brute-forcing channel types, and injecting commands. It supports batch scanning, multithreading, and logging.
Classification
Working Poc 90%
Target:
Erlang/OTP SSH servers (e.g., embedded systems, IoT devices)
No auth needed
Prerequisites:
Network access to vulnerable Erlang-based SSH server · Python environment with required dependencies
nomisec
WORKING POC
by ODST-Forge · remote
https://github.com/ODST-Forge/CVE-2025-32433_PoC
This PoC exploits a pre-authentication RCE vulnerability in Erlang-based SSH servers (CVE-2025-32433) by emulating SSH protocol handshakes and injecting commands via malformed channel requests. It supports batch scanning, multithreading, and reverse shell payloads.
Classification
Working Poc 90%
Target:
Erlang/OTP SSH servers (e.g., embedded systems, IoT devices)
No auth needed
Prerequisites:
Network access to vulnerable Erlang SSH server · Python 3.x with socket/library dependencies
nomisec
WRITEUP
by vigilante-1337 · remote
https://github.com/vigilante-1337/CVE-2025-32433
The repository provides a writeup for CVE-2025-32433, an unauthenticated RCE vulnerability in Erlang/OTP's SSH server. It includes installation instructions for a vulnerable lab environment but lacks actual exploit code.
Classification
Writeup 90%
Target:
Erlang/OTP SSH Server (OTP-27.3.2 and earlier, OTP-26.2.5.10 and earlier, OTP-25.3.2.19 and earlier)
No auth needed
Prerequisites:
Vulnerable Erlang/OTP SSH server instance
nomisec
WORKING POC
by Mdusmandasthaheer · remote
https://github.com/Mdusmandasthaheer/CVE-2025-32433
This repository contains a functional proof-of-concept exploit for CVE-2025-32433, a pre-authentication RCE vulnerability in the Erlang/OTP SSH daemon. The exploit crafts malicious SSH packets to execute arbitrary commands before authentication, demonstrated by writing a file or spawning a reverse shell.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH daemon
No auth needed
Prerequisites:
Network access to the target SSH port · Erlang/OTP SSH daemon running on the target
nomisec
WORKING POC
by l1nuxkid · remote
https://github.com/l1nuxkid/CVE-2025-32433-exploit
This exploit targets a pre-authentication RCE vulnerability in an SSH server by sending malformed SSH protocol packets, specifically SSH_MSG_CHANNEL_REQUEST with an 'exec' payload, to achieve remote command execution. The PoC includes a reverse shell command and follows the SSH protocol structure to bypass authentication.
Classification
Working Poc 95%
Target:
SSH server (specific version not specified, likely a vulnerable implementation)
No auth needed
Prerequisites:
Network access to the target SSH server · Target SSH server must be vulnerable to CVE-2025-32433
nomisec
WORKING POC
by soltanali0 · remote
https://github.com/soltanali0/CVE-2025-32433-Eploit
This is a functional exploit for CVE-2025-32433, targeting a pre-authentication RCE vulnerability in Erlang/OTP SSH. It crafts malicious SSH packets to execute arbitrary Erlang commands on vulnerable servers.
Classification
Working Poc 90%
Target:
Erlang/OTP SSH (version not specified)
No auth needed
Prerequisites:
Network access to the target SSH port · Vulnerable Erlang/OTP SSH service
nomisec
WORKING POC
by giriaryan694-a11y · remote
https://github.com/giriaryan694-a11y/cve-2025-32433_rce_exploit
This repository contains a Python-based exploit for CVE-2025-32433, targeting a pre-authentication RCE vulnerability in Erlang/OTP SSH. The exploit supports both reverse shell execution and a safe file-write test for verification.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH
No auth needed
Prerequisites:
Network access to vulnerable Erlang/OTP SSH service · Listener setup for reverse shell option
nomisec
WORKING POC
by blackcat4347 · remote
https://github.com/blackcat4347/CVE-2025-32433-available-for-windows
This PoC exploits CVE-2025-32433, a vulnerability in the Erlang OTP SSH server, by crafting malicious SSH packets to achieve remote command execution. It leverages the SSH protocol to send a specially formatted 'exec' request with an Erlang payload that executes arbitrary commands on both Windows and Unix systems.
Classification
Working Poc 95%
Target:
Erlang OTP SSH server
No auth needed
Prerequisites:
Network access to the target SSH server · SSH server running on the target
nomisec
WORKING POC
by carlosalbertotuma · remote
https://github.com/carlosalbertotuma/CVE-2025-32433
This repository contains a functional Python exploit for CVE-2025-32433, targeting an authentication bypass in Erlang/OTP's SSH implementation. The exploit crafts malicious SSH packets to execute arbitrary commands or spawn reverse shells without proper authentication.
Classification
Working Poc 95%
Target:
Erlang/OTP (SSH component)
No auth needed
Prerequisites:
Network access to vulnerable Erlang SSH service (default port 2222) · Vulnerable Erlang/OTP version
github
WORKING POC
by Batman529 · pythonremote
https://github.com/Batman529/PoC-CVE-2025-32433
This repository contains a functional Python exploit for CVE-2025-32433, targeting an SSH server vulnerability. The exploit establishes a connection, performs protocol version exchange, key exchange initialization, and sends a crafted channel request to execute arbitrary commands.
Classification
Working Poc 90%
Target:
SSH server (likely OpenSSH or a derivative)
No auth needed
Prerequisites:
Network access to the target SSH server · SSH server listening on the specified port
nomisec
WORKING POC
by agustfricke · poc
https://github.com/agustfricke/erlang-ssh-rce-CVE-2025-32433
This repository contains a functional Go-based exploit for CVE-2025-32433, targeting an Erlang SSH server. The exploit demonstrates pre-authentication remote code execution by sending crafted SSH packets to execute arbitrary commands via the Erlang `os:cmd` function.
Classification
Working Poc 95%
Target:
Erlang SSH server (likely OTP 27.3.2 or similar)
No auth needed
Prerequisites:
Network access to the vulnerable SSH server · Erlang SSH server running on port 2222
metasploit
WORKING POC
EXCELLENT
by Horizon3 Attack Team, Matt Keeley, Martin Kristiansen, mekhalleh (RAMELLA Sebastien) · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/ssh_erlangotp_rce.rb
This Metasploit module exploits CVE-2025-32433, a pre-authentication RCE vulnerability in Erlang-based SSH servers. It crafts malicious SSH packets to execute commands via the Erlang `os:cmd` function, establishing a reverse shell.
Classification
Working Poc 95%
Target:
Erlang OTP SSH server (pre-auth)
No auth needed
Prerequisites:
Network access to target SSH port (default 22) · Vulnerable Erlang OTP SSH service
vulncheck_xdb
WORKING POC
remote
https://github.com/platsecurity/CVE-2025-32433
This repository contains a functional exploit for CVE-2025-32433, targeting an SSH server vulnerability that allows pre-authentication command execution. The PoC constructs malicious SSH packets to trigger the vulnerability, specifically writing a file to the target system.
Classification
Working Poc 95%
Target:
Erlang/OTP SSH server (version 26.2.5.10 or similar)
No auth needed
Prerequisites:
Network access to the target SSH server · SSH server running a vulnerable version of Erlang/OTP