External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.
- https://www.bleepingcomputer.com/news/security/stealth-falcon-hackers-exploited-windows-webdav-zero-day-to-drop-malware/
- https://www.theregister.com/2025/06/10/microsoft_patch_tuesday_june/
- https://www.vicarius.io/vsociety/posts/cve-2025-33053-mitigation-script-remote-code-execution-vulnerability-in-microsoft-webdav
- https://github.com/4n4s4zi/CVE-2025-33053_PoC
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/TheTorjanCaptain/CVE-2025-33053-Checker-PoC
- https://github.com/adam-fff/wtfdav
- https://github.com/cowbe0x004/cowbe0x004
- https://github.com/delldevmann/cybersecurity-news-tracker
- https://github.com/detectrespondrepeat/CVE-2025-33053
- https://github.com/giriaryan694-a11y/exposed-win-zero-days
- https://github.com/joydada29/cybersecurity-watch-report
- https://github.com/kodamap/epss_mcp
- https://github.com/kra1t0/CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/packetinside/CISA_BOT
- https://github.com/tanjiti/sec_profile
- https://github.com/ums91/CISA_BOT
- https://github.com/veath1/LNK-File-WEBDAV-Remote-Code-Execution-Vulnerability