Exploit for CVE-2025-24970

Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to version 4.1.118.Final. When a special crafted packet is received via SslHandler it doesn't correctly handle validation of such a packet in all cases which can lead to a native crash. Version 4.1.118.Final contains a patch. As workaround its possible to either disable the usage of the native SSLEngine or change the code manually.

Published: 2025-02-10

CVSS: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Download Exploit for CVE-2025-24970 here:

Use Tor Browser to access .onion links.

Check our team here:

https://tatramed.sk/exploit-1062-cve-2023-6549/

https://tatramed.sk/exploit-862-cve-2023-21930/

https://tatramed.sk/exploit-30-cve-2024-54024/

https://tatramed.sk/exploit-1015-cve-2022-48618/

https://tatramed.sk/exploit-749-cve-2023-32046/