PT-2025-24329 · Webdav +1 · Webdav +1
Alexandra Gofman
+1
·
Published
2025-01-30
·
Updated
2025-11-30
·
CVE-2025-33053
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows (affected versions not specified)
Description
A remote code execution vulnerability exists in the Web Distributed Authoring and Versioning (WebDAV) component of Microsoft Windows. This flaw allows an attacker to execute arbitrary code by exploiting improper handling of file names or paths, specifically through specially crafted .url files. The vulnerability, tracked as CVE-2025-33053, has been actively exploited in the wild since March 2025 by the Stealth Falcon APT group, targeting defense and government organizations in the Middle East and Africa. The attack involves manipulating the working directory of legitimate Windows tools, such as iediagcmd.exe, to execute malicious code from an actor-controlled WebDAV server. The Stealth Falcon group has used this vulnerability to deploy custom malware, including Horus Agent and Horus Loader. The vulnerability is triggered when a user clicks on a malicious URL. Approximately 80% of devices worldwide may be affected.
Recommendations
Apply the patches provided by Microsoft for CVE-2025-33053.
Exploit
Fix
RCE
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-06673
BDU:2025-06677
CVE-2025-33053
Affected Products
Webdav
Windows
References · 256
- 🔥 https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept⭐ 22 🔗 6 · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-33053-detection-script-remote-code-execution-vulnerability-in-microsoft-webdav · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-33053-mitigation-script-remote-code-execution-vulnerability-in-microsoft-webdav · Exploit
- 🔥 https://research.checkpoint.com/2025/stealth-falcon-zero-day · Exploit
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33053 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-06677 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-33053 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-33053 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/721766 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-06673 · Security Note
- https://github.com/DiscUtils/DiscUtils⭐ 801 🔗 187 · Note
- https://github.com/MythicC2Profiles/httpx⭐ 21 🔗 1 · Note