Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers

Posted on June 13, 2025June 13, 2025 By CWS

A essential zero-day vulnerability in WebDAV implementations that permits distant code execution, with proof-of-concept exploit code now publicly accessible on GitHub. 

The vulnerability, tracked as CVE-2025-33053, has reportedly been actively exploited by superior persistent risk (APT) teams in focused campaigns towards enterprise networks. 

The exploit leverages malicious URL shortcut recordsdata mixed with WebDAV server configurations to realize preliminary entry and lateral motion inside compromised environments.

Vital WebDAV 0-Day RCE Vulnerability

Menace actors have been exploiting this WebDAV vulnerability as a part of broader assault campaigns focusing on organizations with publicly accessible WebDAV providers. 

The assault methodology includes deploying malicious .url shortcut recordsdata that mechanically set up connections to attacker-controlled WebDAV servers when executed by unsuspecting customers. 

These campaigns have demonstrated specific effectiveness towards environments operating Apache2 with WebDAV modules enabled, the place default configurations typically lack satisfactory entry controls.

The vulnerability stems from improper dealing with of URL shortcut recordsdata that comprise UNC (Common Naming Conference) paths pointing to distant WebDAV shares. 

When victims work together with these recordsdata, Home windows methods mechanically try to authenticate with the distant server, doubtlessly exposing NTLM credentials or triggering the execution of malicious payloads. 

Safety researchers have noticed APT teams distributing these weaponized shortcuts via phishing campaigns, typically disguised as official enterprise paperwork with names like “finance_report.url” or related contextually related filenames.

Proof-of-Idea Launched

Safety researcher DevBuiHieu has printed a complete proof-of-concept repository demonstrating the vulnerability’s exploitation mechanisms. 

The toolkit consists of automated scripts for establishing WebDAV infrastructure and producing malicious shortcut recordsdata. The first setup script, setup_webdav.sh, automates the deployment of weak WebDAV configurations:

The exploitation toolkit additionally includes a Python-based payload generator (gen_url.py) that creates weaponized URL shortcut recordsdata with customizable parameters:

Superior configuration choices enable attackers to specify customized executables, icon recordsdata, and dealing directories inside the malicious shortcuts. 

The generated .url recordsdata comprise specifically crafted InternetShortcut sections that reference distant WebDAV paths via UNC notation, triggering automated connection makes an attempt when opened. 

These recordsdata sometimes embrace parameters equivalent to WorkingDirectory=192.168.1.100webdav and customizable IconFile paths to boost social engineering effectiveness.

The general public launch of this proof-of-concept considerably elevates the risk panorama for organizations using WebDAV providers. 

System directors ought to instantly audit their Apache2 WebDAV configurations and implement restrictive entry controls to stop unauthorized connections. 

Vital mitigation steps embrace disabling pointless DAV and DAV_FS modules, implementing sturdy authentication mechanisms, and limiting WebDAV entry to authenticated customers solely.

Organizations also needs to deploy e-mail safety options able to detecting and quarantining malicious URL shortcut recordsdata, as conventional antivirus options might not reliably establish these assault vectors. 

Community monitoring ought to concentrate on figuring out uncommon UNC path connections and WebDAV site visitors patterns that would point out exploitation makes an attempt. 

Group Coverage configurations must be reviewed to limit automated community authentication and stop unauthorized entry to distant assets.

Stay Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:0Day, APT, Critical, Exploit, Exploited, Hackers, PoC, RCE, Released, Vulnerability, WebDAV

Post navigation

Previous Post: Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists
Next Post: Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Related Posts

macOS Gatekeeper Explained: Strengthening System Defenses Cyber Security News
Supply Chain Security Mitigating Third-Party Risks Cyber Security News
Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside  Cyber Security News
Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions Cyber Security News
Securing Generative AI – Mitigating Data Leakage Risks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • How to Create an Incident Response Playbook
  • China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
  • New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
  • Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • How to Create an Incident Response Playbook
  • China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
  • New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
  • Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News