diff --git a/Erlang-OTP SSH Server Code Execution Vulnerability (CVE-2025-32433).md b/Erlang-OTP SSH Server Code Execution Vulnerability (CVE-2025-32433).md new file mode 100644 index 0000000..80a44b1 --- /dev/null +++ b/Erlang-OTP SSH Server Code Execution Vulnerability (CVE-2025-32433).md @@ -0,0 +1,14 @@ +**Updated document date: April 25, 2025** + +## Erlang/OTP SSH Server Code Execution Vulnerability (CVE-2025-32433) +| **Vulnerability** | LErlang/OTP SSH Server Code Execution Vulnerability (CVE-2025-32433)| +| :----: | :-----| +| **Chinese name** |Erlang/OTP SSH服务器 代码执行漏洞(CVE-2025-32433) | +| **CVSS core** | 10 | +| **FOFA Query** (click to view the results directly)| [protocol="ssh" && banner="Erlang"] +| **Number of assets affected** | 600+ | +| **Description** |Erlang/OTP is a widely used programming language and runtime system primarily for building distributed systems. A critical security vulnerability exists in the Erlang/OTP SSH implementation, allowing attackers to execute arbitrary code without authentication by exploiting flaws in SSH protocol message handling.| +| **Impact** | When the SSH daemon runs with root privileges, attackers can gain full control of the device. This vulnerability affects all SSH servers based on the Erlang/OTP SSH library.| +| **Affected versions** |