PT-2025-24329 · Webdav +1 · Webdav +1
Alexandra Gofman
+1
·
Published
2025-01-30
·
Updated
2026-01-12
·
CVE-2025-33053
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to July 2025 Patch Tuesday
Description
A remote code execution vulnerability exists in the Web Distributed Authoring and Versioning (WebDAV) component of Microsoft Windows. This flaw, tracked as CVE-2025-33053, allows attackers to execute arbitrary code by exploiting a weakness in how the system handles file paths when opening specially crafted .url files. The Stealth Falcon APT group has been actively exploiting this vulnerability since March 2025, targeting defense and government organizations in the Middle East and Africa. The attack involves using a malicious .url file that leverages a legitimate Windows tool to execute malware from an actor-controlled WebDAV server. The vulnerability is actively exploited in the wild and has been used to deploy custom malware, including Horus Agent and Horus Loader. The vulnerability allows remote attackers to execute arbitrary code and affect the system.
Recommendations
Apply the Microsoft security updates released as part of the July 2025 Patch Tuesday.
Exploit
Fix
RCE
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-06673
BDU:2025-06677
CVE-2025-33053
Affected Products
Webdav
Windows
References · 258
- 🔥 https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept⭐ 22 🔗 6 · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-33053-mitigation-script-remote-code-execution-vulnerability-in-microsoft-webdav · Exploit
- 🔥 https://research.checkpoint.com/2025/stealth-falcon-zero-day · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-33053-detection-script-remote-code-execution-vulnerability-in-microsoft-webdav · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-33053 · Security Note
- https://bdu.fstec.ru/vul/2025-06677 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33053 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-06673 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-33053 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/721766 · Security Note
- https://github.com/DiscUtils/DiscUtils⭐ 801 🔗 187 · Note
- https://github.com/MythicC2Profiles/httpx⭐ 21 🔗 1 · Note