CVE-2025-33053 Exploit via Malicious .URL File and WebDAV
Title source: metasploitDescription
External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.
Exploits (6)
nomisec
WORKING POC
64 stars
by DevBuiHieu · client-side
https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept
nomisec
WORKING POC
1 stars
by kra1t0 · poc
https://github.com/kra1t0/CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept
nomisec
WORKING POC
1 stars
by TheTorjanCaptain · poc
https://github.com/TheTorjanCaptain/CVE-2025-33053-Checker-PoC
metasploit
WORKING POC
NORMAL
by Alexandra Gofman, David Driker, Dev Bui Hieu · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/unc_url_cve_2025_33053.rb
References (9)
Scores
CVSS v3
8.8
EPSS
0.5028
EPSS Percentile
97.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lab Environment
Details
CISA KEV
2025-06-10
VulnCheck KEV
2025-06-10
ENISA EUVD
EUVD-2025-17721
CWE
CWE-73
Status
published
Products (17)
microsoft/windows_10_1507
< 10.0.10240.21034 (2 CPE variants)
microsoft/windows_10_1607
< 10.0.14393.8148 (2 CPE variants)
microsoft/windows_10_1809
< 10.0.17763.7434 (2 CPE variants)
microsoft/windows_10_21h2
< 10.0.19044.5965 (3 CPE variants)
microsoft/windows_10_22h2
< 10.0.19045.5965 (3 CPE variants)
microsoft/windows_11_22h2
< 10.0.22621.5472 (2 CPE variants)
microsoft/windows_11_23h2
< 10.0.22631.5472 (2 CPE variants)
microsoft/windows_11_24h2
< 10.0.26100.4270 (2 CPE variants)
microsoft/windows_server_2008
(2 CPE variants)
microsoft/windows_server_2008
r2 sp1
... and 7 more
Published
Jun 10, 2025
KEV Added
Jun 10, 2025
Tracked Since
Feb 18, 2026