Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers

Posted on June 13, 2025June 13, 2025 By CWS

A essential zero-day vulnerability in WebDAV implementations that permits distant code execution, with proof-of-concept exploit code now publicly accessible on GitHub. 

The vulnerability, tracked as CVE-2025-33053, has reportedly been actively exploited by superior persistent risk (APT) teams in focused campaigns towards enterprise networks. 

The exploit leverages malicious URL shortcut recordsdata mixed with WebDAV server configurations to realize preliminary entry and lateral motion inside compromised environments.

Vital WebDAV 0-Day RCE Vulnerability

Menace actors have been exploiting this WebDAV vulnerability as a part of broader assault campaigns focusing on organizations with publicly accessible WebDAV providers. 

The assault methodology includes deploying malicious .url shortcut recordsdata that mechanically set up connections to attacker-controlled WebDAV servers when executed by unsuspecting customers. 

These campaigns have demonstrated specific effectiveness towards environments operating Apache2 with WebDAV modules enabled, the place default configurations typically lack satisfactory entry controls.

The vulnerability stems from improper dealing with of URL shortcut recordsdata that comprise UNC (Common Naming Conference) paths pointing to distant WebDAV shares. 

When victims work together with these recordsdata, Home windows methods mechanically try to authenticate with the distant server, doubtlessly exposing NTLM credentials or triggering the execution of malicious payloads. 

Safety researchers have noticed APT teams distributing these weaponized shortcuts via phishing campaigns, typically disguised as official enterprise paperwork with names like “finance_report.url” or related contextually related filenames.

Proof-of-Idea Launched

Safety researcher DevBuiHieu has printed a complete proof-of-concept repository demonstrating the vulnerability’s exploitation mechanisms. 

The toolkit consists of automated scripts for establishing WebDAV infrastructure and producing malicious shortcut recordsdata. The first setup script, setup_webdav.sh, automates the deployment of weak WebDAV configurations:

The exploitation toolkit additionally includes a Python-based payload generator (gen_url.py) that creates weaponized URL shortcut recordsdata with customizable parameters:

Superior configuration choices enable attackers to specify customized executables, icon recordsdata, and dealing directories inside the malicious shortcuts. 

The generated .url recordsdata comprise specifically crafted InternetShortcut sections that reference distant WebDAV paths via UNC notation, triggering automated connection makes an attempt when opened. 

These recordsdata sometimes embrace parameters equivalent to WorkingDirectory=192.168.1.100webdav and customizable IconFile paths to boost social engineering effectiveness.

The general public launch of this proof-of-concept considerably elevates the risk panorama for organizations using WebDAV providers. 

System directors ought to instantly audit their Apache2 WebDAV configurations and implement restrictive entry controls to stop unauthorized connections. 

Vital mitigation steps embrace disabling pointless DAV and DAV_FS modules, implementing sturdy authentication mechanisms, and limiting WebDAV entry to authenticated customers solely.

Organizations also needs to deploy e-mail safety options able to detecting and quarantining malicious URL shortcut recordsdata, as conventional antivirus options might not reliably establish these assault vectors. 

Community monitoring ought to concentrate on figuring out uncommon UNC path connections and WebDAV site visitors patterns that would point out exploitation makes an attempt. 

Group Coverage configurations must be reviewed to limit automated community authentication and stop unauthorized entry to distant assets.

Stay Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:0Day, APT, Critical, Exploit, Exploited, Hackers, PoC, RCE, Released, Vulnerability, WebDAV

Post navigation

Previous Post: Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists
Next Post: Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Related Posts

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024 Cyber Security News
Building a Cyber-Resilient Organization CISOs Roadmap Cyber Security News
Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards Cyber Security News
Cybersecurity Newsletter Weekly Recap – UK Hacker Bust to BMW Data Leak Cyber Security News
Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks Cyber Security News
Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm
  • 136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
  • PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code
  • DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
  • PolarEdge Botnet Infected 25,000+ Devices and 140 C2 Servers Exploiting IoT Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm
  • 136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
  • PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code
  • DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
  • PolarEdge Botnet Infected 25,000+ Devices and 140 C2 Servers Exploiting IoT Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News