Exploit for CVE-2025-37899

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in session logoff

The sess->user object can currently be in use by another thread, for
example if another connection has sent a session setup request to
bind to the session being free'd. The handler for that connection could
be in the smb2_sess_setup function which makes use of sess->user.

Published: 2025-05-20

CVSS: 7.8

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Download Exploit for CVE-2025-37899 here:

Use Tor Browser to access .onion links.

Check our team here:

https://tatramed.sk/exploit-964-cve-2025-31366/

https://tatramed.sk/exploit-263-cve-2020-6418/

https://tatramed.sk/exploit-94-cve-2025-47912/