module

CVE-2025-33053 Exploit via Malicious .URL File and WebDAV

Disclosed
Jun 11, 2025
Created
Jun 29, 2025

Description

This module exploits CVE-2025-33053 by generating a malicious .URL file pointing
to a trusted LOLBAS binary with parameters designed to trigger unintended behavior.
Optionally, a payload is generated and hosted on a specified WebDAV directory.
When the victim opens the shortcut, it will attempt to access the WebDAV path,
potentially resulting in remote code execution via a trusted binary.

Authors

Alexandra Gofman
David Driker
Dev Bui Hieu

Platform

Windows

Architectures

x64, x86, aarch64

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/fileformat/unc_url_cve_2025_33053
msf exploit(unc_url_cve_2025_33053) > show targets
...targets...
msf exploit(unc_url_cve_2025_33053) > set TARGET < target-id >
msf exploit(unc_url_cve_2025_33053) > show options
...show and set options...
msf exploit(unc_url_cve_2025_33053) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.