Tech »  Topic »  WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released

WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released


Credential Abuse: 15-Min Attack Simulation

A critical zero-day vulnerability in Microsoft’s Web Distributed Authoring and Versioning (WebDAV) protocol, tracked as CVE-2025-33053, has been actively exploited by the advanced persistent threat (APT) group Stealth Falcon since March 2025.

The flaw, patched in June’s Patch Tuesday, enables remote code execution (RCE) via manipulated .url shortcut files and has been linked to attacks against Middle Eastern defense sectors.

Vulnerability Overview

According to the report, CVE-2025-33053 (CVSS 8.8) allows attackers to hijack the working directory of legitimate Windows tools like iediagcmd.exe, forcing them to execute malicious payloads from attacker-controlled WebDAV servers.

Key details:

Component Details
Affected Systems Windows 10/11, Server 2016–2025, and legacy unsupported versions
Exploit Mechanism Abuse of WebDAV’s UNC path handling to redirect WorkingDirectory
Initial Vector Phishing emails with .url files masquerading as PDFs
Primary Payload Horus Agent (Mythic framework-based implant with anti-analysis techniques)

Technical ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE