github
WORKING POC
169 stars
by jiansiting · pythonremote
https://github.com/jiansiting/CVE-2025-59287
This repository contains a functional exploit for CVE-2025-59287, targeting unsafe deserialization in Microsoft Windows Server Update Services (WSUS). The exploit leverages AES-128-CBC decryption and BinaryFormatter deserialization to achieve remote code execution with SYSTEM privileges.
Classification
Working Poc 95%
Target:
Microsoft Windows Server Update Services (WSUS)
Auth required
Prerequisites:
WSUS server access · AES-128-CBC encryption key
github
WRITEUP
26 stars
by Lupovis · shellpoc
https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS
This repository provides a defensive honeypot for CVE-2025-59287, emulating WSUS endpoints to capture and analyze attacker activity. It includes a Flask-based capture service, detection rules, and a Windows test harness for validation.
Classification
Writeup 95%
Target:
Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Isolated lab or segmented test environment · WSUS-like endpoints emulation
github
WORKING POC
14 stars
by garvitv14 · pythonremote
https://github.com/garvitv14/CVE-2025-59287
This repository contains a functional exploit for CVE-2025-59287, targeting a WSUS (Windows Server Update Services) vulnerability. The exploit automates the generation of a malicious .NET payload using ysoserial, encrypts it with a hardcoded AES key, and delivers it via a crafted SOAP request to achieve unauthenticated remote code execution.
Classification
Working Poc 95%
Target:
Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Network access to the WSUS server · ysoserial.NET for payload generation · .NET runtime (Wine, Mono, or Windows)
github
WORKING POC
12 stars
by tecxx · powershellremote
https://github.com/tecxx/CVE-2025-59287-WSUS
This repository contains a functional PowerShell exploit for CVE-2025-59287, targeting an unauthenticated RCE vulnerability in WSUS. The script automates the exploitation process by generating a malicious payload using ysoserial.net and triggering it via WSUS console interaction.
Classification
Working Poc 95%
Target:
Windows Server Update Services (WSUS) version 10.0.20348.1
No auth needed
Prerequisites:
Unpatched WSUS server · Network access to WSUS server · Netcat listener for reverse shell
nomisec
WORKING POC
7 stars
by M507 · poc
https://github.com/M507/CVE-2025-59287-PoC
This PoC exploits CVE-2025-59287, a deserialization vulnerability in Microsoft Windows Update Service (WSUS). It demonstrates unauthorized remote code execution by leveraging SOAP-based authentication bypass and crafted payloads.
Classification
Working Poc 90%
Target:
Microsoft Windows Update Service (WSUS)
No auth needed
Prerequisites:
Network access to vulnerable WSUS server · Python environment with required dependencies
github
WRITEUP
7 stars
by AdityaBhatt3010 · sqlpoc
https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector
This repository provides a detailed technical analysis of CVE-2025-59287, an unauthenticated RCE vulnerability in Windows Server Update Services (WSUS) due to unsafe deserialization. It includes IoCs, detection rules, and mitigation steps but does not contain functional exploit code.
Classification
Writeup 95%
Attack Type
Deserialization
Target:
Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Network access to WSUS endpoints (TCP 8530/8531) · Vulnerable WSUS installation
github
WORKING POC
4 stars
by dexterm300 · pythonremote
https://github.com/dexterm300/cve-2025-59287-exploit-poc
This repository contains a functional exploit for CVE-2025-59287, a critical RCE vulnerability in Microsoft WSUS due to unsafe deserialization in the BinaryFormatter component. The exploit includes a C# payload generator and Python scripts to encrypt and deliver the payload via the GetCookie() endpoint.
Classification
Working Poc 95%
Target:
Microsoft Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Access to WSUS server (port 8530/8531) · Python environment with dependencies · .NET Framework for payload generation
github
WORKING POC
4 stars
by mrk336 · remote
https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat
The repository contains a functional PowerShell exploit for CVE-2025-59287, a critical RCE vulnerability in Windows Server Update Services (WSUS) due to unsafe deserialization. It includes a detailed technical writeup, an XML payload, and a PowerShell script to generate and upload the malicious payload to a vulnerable WSUS server.
Classification
Working Poc 95%
Target:
Windows Server Update Services (WSUS) on Windows Server 2012-2025
No auth needed
Prerequisites:
Network connectivity to the target WSUS server · Ability to upload files via HTTP PUT
github
WORKING POC
3 stars
by QurtiDev · c#remote
https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE
This repository contains a functional exploit for CVE-2025-59287, a critical remote code execution vulnerability in Microsoft Windows Server Update Services (WSUS). The exploit leverages insecure deserialization in the GetCookie() endpoint to achieve unauthenticated RCE with SYSTEM privileges.
Classification
Working Poc 95%
Target:
Microsoft Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Target WSUS server URL · Attacker-controlled IP and port for reverse shell
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-59287
This repository contains a functional exploit PoC for CVE-2025-59287, targeting a deserialization vulnerability in Microsoft Windows Update Service (WSUS). The exploit chain involves authentication cookie retrieval, server ID extraction, and crafted SOAP requests to trigger deserialization for potential RCE.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Microsoft Windows Update Service (WSUS)
No auth needed
Prerequisites:
Network access to WSUS server · SOAP endpoint availability
github
WORKING POC
1 stars
by N3k0t-dev · pythonpoc
https://github.com/N3k0t-dev/PoC-CVE-collection
The repository contains a functional exploit for CVE-2025-11953, a critical OS command injection vulnerability in React Native Community CLI Metro Development Server. It includes both basic and advanced exploitation scripts, demonstrating arbitrary command execution via the unsanitized `open-url` endpoint.
Classification
Working Poc 95%
Target:
react-native-community/cli-server-api (4.8.0 - 20.0.0-alpha.2)
No auth needed
Prerequisites:
Access to the Metro Development Server on port 8081 · Network connectivity to the target
nomisec
WORKING POC
1 stars
by Adel-kaka-dz · remote
https://github.com/Adel-kaka-dz/cve-2025-59287
This repository contains a Python-based exploit for CVE-2025-59287, targeting a remote code execution vulnerability in Windows Server Update Services (WSUS). It includes modules for payload encryption and exploitation, with support for both legacy and secure encryption modes.
Classification
Working Poc 90%
Target:
Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Network access to vulnerable WSUS server · Python environment with required dependencies
nomisec
WORKING POC
1 stars
by LuemmelSec · remote
https://github.com/LuemmelSec/CVE-2025-59287---WSUS-SCCM-RCE
This PoC exploits a deserialization vulnerability in WSUS/SCCM via crafted SOAP requests, leveraging ysoserial.net to generate malicious payloads for remote code execution. It automates authentication, cookie retrieval, and payload delivery to trigger RCE.
Classification
Working Poc 95%
Target:
Microsoft WSUS/SCCM (version unspecified)
No auth needed
Prerequisites:
Network access to WSUS/SCCM server · ysoserial.net for payload generation
github
WORKING POC
by ross-ns · powershellremote
https://github.com/ross-ns/WSUS-CVE-2025-59287
This repository contains a functional PowerShell exploit for CVE-2025-59287, targeting a deserialization vulnerability in WSUS. The script generates a reverse shell payload, retrieves necessary cookies, and triggers the exploit via crafted SOAP requests.
Classification
Working Poc 95%
Target:
Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Network access to WSUS server · ysoserial.exe for payload generation
nomisec
TROJAN
by vatslaaeytoygag · poc
https://github.com/vatslaaeytoygag/CVE-2025-59287
The repository contains obfuscated code in `encrypt.py` that attempts to execute malicious commands via subprocess, disguised as a WSUS exploit toolkit. The README lacks technical details about CVE-2025-59287 and instead provides generic installation instructions.
Classification
Trojan 95%
Target:
WSUS (Windows Server Update Services)
No auth needed
Prerequisites:
Network access to target WSUS server
nomisec
TROJAN
by salman5230 · poc
https://github.com/salman5230/CVE-2025-59287
The repository claims to be a PoC for CVE-2025-59287 but contains obfuscated code that downloads and executes a malicious payload. The README misleadingly describes a booklist management tool while the code initializes a hidden process to fetch and run a remote script.
Classification
Trojan 95%
Target:
Unspecified (likely a decoy)
No auth needed
Prerequisites:
Victim must run the script
nomisec
WORKING POC
by swoon69 · poc
https://github.com/swoon69/CVE-2025-59287-Exercise-Use
This repository contains a functional exploit chain for CVE-2025-59287, targeting WSUS servers via deserialization. It includes scripts to check vulnerability, generate payloads (file drop or reverse shell), and deliver the exploit.
Classification
Working Poc 95%
Target:
Microsoft Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
ysoserial.exe for payload generation · network access to WSUS server
github
WORKING POC
by 0xBruno · c#remote
https://github.com/0xBruno/WSUSploit.NET
This repository contains a functional exploit for CVE-2025-59287, targeting WSUS servers via deserialization of a malicious payload. The exploit crafts a serialized object with embedded XAML to achieve remote code execution on vulnerable systems.
Classification
Working Poc 95%
Target:
Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Access to WSUS server endpoint · WSUS server vulnerable to deserialization attack
github
WORKING POC
by FurkanKAYAPINAR · pythonremote
https://github.com/FurkanKAYAPINAR/CVE-2025-59287
This repository contains a functional exploit for CVE-2025-59287, targeting a WSUS XML deserialization vulnerability to achieve remote code execution. The exploit chains multiple SOAP endpoints to authenticate and deliver a malicious payload via a crafted XML event.
Classification
Working Poc 95%
Target:
Microsoft Windows Server Update Services (WSUS)
Auth required
Prerequisites:
Network access to WSUS server · WSUS service exposed and vulnerable
nomisec
WRITEUP
by gud425 · remote
https://github.com/gud425/gud425.github.io
This is a detailed technical analysis of CVE-2025-59287, a deserialization vulnerability in Microsoft WSUS. The writeup includes root cause analysis, affected versions, and a breakdown of the vulnerable `DecryptData()` function.
Classification
Writeup 100%
Attack Type
Deserialization
Target:
Microsoft Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Network access to WSUS server
metasploit
WORKING POC
GREAT
by mwulftange, msutovsky-r7 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/wsus_deserialization_rce.rb
This Metasploit module exploits a deserialization vulnerability in Windows Server Update Services (WSUS) to achieve remote code execution. It leverages SOAP requests to trigger unsafe deserialization, executing payloads in an administrator context.
Classification
Working Poc 95%
Target:
Windows Server Update Services (WSUS)
No auth needed
Prerequisites:
Network access to WSUS server · WSUS service running on default port 8530