Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers

Posted on June 13, 2025June 13, 2025 By CWS

A essential zero-day vulnerability in WebDAV implementations that permits distant code execution, with proof-of-concept exploit code now publicly accessible on GitHub. 

The vulnerability, tracked as CVE-2025-33053, has reportedly been actively exploited by superior persistent risk (APT) teams in focused campaigns towards enterprise networks. 

The exploit leverages malicious URL shortcut recordsdata mixed with WebDAV server configurations to realize preliminary entry and lateral motion inside compromised environments.

Vital WebDAV 0-Day RCE Vulnerability

Menace actors have been exploiting this WebDAV vulnerability as a part of broader assault campaigns focusing on organizations with publicly accessible WebDAV providers. 

The assault methodology includes deploying malicious .url shortcut recordsdata that mechanically set up connections to attacker-controlled WebDAV servers when executed by unsuspecting customers. 

These campaigns have demonstrated specific effectiveness towards environments operating Apache2 with WebDAV modules enabled, the place default configurations typically lack satisfactory entry controls.

The vulnerability stems from improper dealing with of URL shortcut recordsdata that comprise UNC (Common Naming Conference) paths pointing to distant WebDAV shares. 

When victims work together with these recordsdata, Home windows methods mechanically try to authenticate with the distant server, doubtlessly exposing NTLM credentials or triggering the execution of malicious payloads. 

Safety researchers have noticed APT teams distributing these weaponized shortcuts via phishing campaigns, typically disguised as official enterprise paperwork with names like “finance_report.url” or related contextually related filenames.

Proof-of-Idea Launched

Safety researcher DevBuiHieu has printed a complete proof-of-concept repository demonstrating the vulnerability’s exploitation mechanisms. 

The toolkit consists of automated scripts for establishing WebDAV infrastructure and producing malicious shortcut recordsdata. The first setup script, setup_webdav.sh, automates the deployment of weak WebDAV configurations:

The exploitation toolkit additionally includes a Python-based payload generator (gen_url.py) that creates weaponized URL shortcut recordsdata with customizable parameters:

Superior configuration choices enable attackers to specify customized executables, icon recordsdata, and dealing directories inside the malicious shortcuts. 

The generated .url recordsdata comprise specifically crafted InternetShortcut sections that reference distant WebDAV paths via UNC notation, triggering automated connection makes an attempt when opened. 

These recordsdata sometimes embrace parameters equivalent to WorkingDirectory=192.168.1.100webdav and customizable IconFile paths to boost social engineering effectiveness.

The general public launch of this proof-of-concept considerably elevates the risk panorama for organizations using WebDAV providers. 

System directors ought to instantly audit their Apache2 WebDAV configurations and implement restrictive entry controls to stop unauthorized connections. 

Vital mitigation steps embrace disabling pointless DAV and DAV_FS modules, implementing sturdy authentication mechanisms, and limiting WebDAV entry to authenticated customers solely.

Organizations also needs to deploy e-mail safety options able to detecting and quarantining malicious URL shortcut recordsdata, as conventional antivirus options might not reliably establish these assault vectors. 

Community monitoring ought to concentrate on figuring out uncommon UNC path connections and WebDAV site visitors patterns that would point out exploitation makes an attempt. 

Group Coverage configurations must be reviewed to limit automated community authentication and stop unauthorized entry to distant assets.

Stay Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:0Day, APT, Critical, Exploit, Exploited, Hackers, PoC, RCE, Released, Vulnerability, WebDAV

Post navigation

Previous Post: Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists
Next Post: Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Related Posts

FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign Cyber Security News
Linux Malware Authors Attacking Cloud Environments Using ELF Binaries Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News
Supply Chain Security Mitigating Third-Party Risks Cyber Security News
New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News
Developing Collaborative Threat Intelligence Sharing Frameworks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services
  • Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access
  • AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
  • Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services
  • Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access
  • AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
  • Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News