CVE-2025-33053

HIGH KEV LAB

CVE-2025-33053 Exploit via Malicious .URL File and WebDAV

Title source: metasploit

Description

External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.

Exploits (6)

nomisec WORKING POC 64 stars
by DevBuiHieu · client-side
https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept
nomisec WORKING POC 1 stars
by 4n4s4zi · client-side
https://github.com/4n4s4zi/CVE-2025-33053_PoC
nomisec WORKING POC 1 stars
by kra1t0 · poc
https://github.com/kra1t0/CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept
nomisec WORKING POC 1 stars
by TheTorjanCaptain · poc
https://github.com/TheTorjanCaptain/CVE-2025-33053-Checker-PoC
nomisec WORKING POC
by Cyberw1ng · poc
https://github.com/Cyberw1ng/CVE-2025-33053-POC
metasploit WORKING POC NORMAL
by Alexandra Gofman, David Driker, Dev Bui Hieu · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/unc_url_cve_2025_33053.rb

Scores

CVSS v3 8.8
EPSS 0.5028
EPSS Percentile 97.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CISA KEV 2025-06-10
VulnCheck KEV 2025-06-10
ENISA EUVD EUVD-2025-17721
CWE
CWE-73
Status published
Products (17)
microsoft/windows_10_1507 < 10.0.10240.21034 (2 CPE variants)
microsoft/windows_10_1607 < 10.0.14393.8148 (2 CPE variants)
microsoft/windows_10_1809 < 10.0.17763.7434 (2 CPE variants)
microsoft/windows_10_21h2 < 10.0.19044.5965 (3 CPE variants)
microsoft/windows_10_22h2 < 10.0.19045.5965 (3 CPE variants)
microsoft/windows_11_22h2 < 10.0.22621.5472 (2 CPE variants)
microsoft/windows_11_23h2 < 10.0.22631.5472 (2 CPE variants)
microsoft/windows_11_24h2 < 10.0.26100.4270 (2 CPE variants)
microsoft/windows_server_2008 (2 CPE variants)
microsoft/windows_server_2008 r2 sp1
... and 7 more
Published Jun 10, 2025
KEV Added Jun 10, 2025
Tracked Since Feb 18, 2026