mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 18:27:13 +00:00
Create Erlang-OTP SSH Server Code Execution Vulnerability (CVE-2025-32433).md
This commit is contained in:
parent
4552f30cf7
commit
614427b789
@ -0,0 +1,14 @@
|
|||||||
|
**Updated document date: April 25, 2025**
|
||||||
|
|
||||||
|
## Erlang/OTP SSH Server Code Execution Vulnerability (CVE-2025-32433)
|
||||||
|
| **Vulnerability** | LErlang/OTP SSH Server Code Execution Vulnerability (CVE-2025-32433)|
|
||||||
|
| :----: | :-----|
|
||||||
|
| **Chinese name** |Erlang/OTP SSH服务器 代码执行漏洞(CVE-2025-32433) |
|
||||||
|
| **CVSS core** | 10 |
|
||||||
|
| **FOFA Query** (click to view the results directly)| [protocol="ssh" && banner="Erlang"]
|
||||||
|
| **Number of assets affected** | 600+ |
|
||||||
|
| **Description** |Erlang/OTP is a widely used programming language and runtime system primarily for building distributed systems. A critical security vulnerability exists in the Erlang/OTP SSH implementation, allowing attackers to execute arbitrary code without authentication by exploiting flaws in SSH protocol message handling.|
|
||||||
|
| **Impact** | When the SSH daemon runs with root privileges, attackers can gain full control of the device. This vulnerability affects all SSH servers based on the Erlang/OTP SSH library.|
|
||||||
|
| **Affected versions** | <OTP-27.3.3、<OTP-26.2.5.11、<OTP-25.3.2.20
|
||||||
|
|
||||||
|

|
Loading…
x
Reference in New Issue
Block a user