From 4552f30cf75dcb149e61350fcb9f74c20d839de5 Mon Sep 17 00:00:00 2001 From: Goby <50955360+gobysec@users.noreply.github.com> Date: Fri, 25 Apr 2025 17:58:13 +0800 Subject: [PATCH] Update GobyVuls-Document.md --- GobyVuls-Document.md | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/GobyVuls-Document.md b/GobyVuls-Document.md index 9c8e6b5..bd93dd4 100644 --- a/GobyVuls-Document.md +++ b/GobyVuls-Document.md @@ -1,6 +1,21 @@ # Goby History Update Vulnerability Total Document (Continuously Update) The following content is an updated vulnerability from Goby. Some of the vulnerabilities are recorded on the screen for easy viewing. +**Updated document date: April 25, 2025** + +## Erlang/OTP SSH Server Code Execution Vulnerability (CVE-2025-32433) +| **Vulnerability** | LErlang/OTP SSH Server Code Execution Vulnerability (CVE-2025-32433)| +| :----: | :-----| +| **Chinese name** |Erlang/OTP SSH服务器 代码执行漏洞(CVE-2025-32433) | +| **CVSS core** | 10 | +| **FOFA Query** (click to view the results directly)| [protocol="ssh" && banner="Erlang"] +| **Number of assets affected** | 600+ | +| **Description** |Erlang/OTP is a widely used programming language and runtime system primarily for building distributed systems. A critical security vulnerability exists in the Erlang/OTP SSH implementation, allowing attackers to execute arbitrary code without authentication by exploiting flaws in SSH protocol message handling.| +| **Impact** | When the SSH daemon runs with root privileges, attackers can gain full control of the device. This vulnerability affects all SSH servers based on the Erlang/OTP SSH library.| +| **Affected versions** |