Published July 21, 2025
IRIS C2 Delivers Day-Zero SharePoint Exploit Module for CVE-2025-53770
Breaking: Critical SharePoint Vulnerability Actively Exploited in the Wild
Just hours after Eye Security broke the news about CVE-2025-53770 (dubbed "ToolShell"), a critical unauthenticated remote code execution vulnerability affecting all on-premises SharePoint servers, IRIS C2 customers already have access to a fully-featured exploitation module. While Microsoft scrambles to develop patches and organizations worldwide assess their exposure, IRIS C2 operators can immediately begin testing and securing their environments.
The vulnerability, which carries a CVSS score of 9.8, affects SharePoint Server 2016, 2019, and Subscription Edition. As of this writing, Microsoft has not released any patches, and given the nature of on-premises deployments, many organizations will remain vulnerable for weeks or even months to come.
Immediate Response: The IRIS C2 SharePoint Exploit Module
Our security research team worked through the night to deliver a production-ready module that enables:
- Automated scanning for vulnerable SharePoint servers
- One-click exploitation with full RCE capabilities
- Cryptographic key extraction for persistent access
- Complete post-exploitation framework
- Anti-forensics and evasion techniques

Key Features and Capabilities
1. Vulnerability Information Dashboard
The module provides comprehensive information about the vulnerability, including:
- CVE details and CVSS scoring
- Affected versions and exploit chain information
- Real-time IOCs from active exploitation campaigns
- Detection signatures (Exploit:W32/W3WPLaunch.A!DeepGuard)
Detailed vulnerability information and IOCs at your fingertips
2. Mass Vulnerability Scanning
Our scanning engine can rapidly identify vulnerable SharePoint instances across your network or target ranges:

Key scanning features:
- Parallel scanning with configurable threads
- Multiple detection methods (version headers, endpoints, error pages)
- Automatic vulnerability verification
- Export capabilities for scan results
3. One-Click Exploitation
Once vulnerable servers are identified, exploitation is as simple as selecting targets and clicking "Exploit":
Streamlined exploitation interface with target management
The module handles the entire exploit chain automatically:
- Authentication bypass via the SignOut.aspx Referer trick
- Deserialization RCE through ToolPane.aspx
- Deployment of the SharpyShell web shell (spinstall0.aspx)
- Extraction of cryptographic keys for persistent access
4. Advanced Payload Generation
Generate custom ViewState payloads using the extracted cryptographic material:

Our implementation includes:
- Native .NET deserialization gadget chains
- TypeConfuseDelegate payload support
- Signed ViewState generation with HMAC validation
- No dependency on external tools like ysoserial.net
5. Comprehensive Post-Exploitation
The module provides a full suite of post-exploitation capabilities:

Available actions include:
- Persistence: Deploy hidden backdoors
- Credential Theft: Extract SharePoint service accounts and IIS AppPool credentials
- Database Access: Dump SharePoint content databases
- Domain Enumeration: Leverage SharePoint's AD integration
- Anti-Forensics: Clean logs and traces
6. Real-Time Console and Logging
Monitor all operations in real-time with our integrated console.
7. Comprehensive Reporting
Export detailed reports of all exploitation activities.
Technical Implementation Highlights
Native Payload Generation
Unlike other tools that rely on external binaries, our module includes a native C++ implementation of the required .NET deserialization gadgets. This means:
- No external dependencies
- Faster payload generation
- Better operational security
- Cross-platform compatibility
Operational Considerations
Detection and Evasion
The module includes several evasion techniques:
- Randomized User-Agent strings
- X-Forwarded-For header manipulation
- Configurable request timing
- Anti-forensics capabilities
Responsible Use
This module is intended for:
- Authorized penetration testing
- Security assessment of your own infrastructure
- Research and defensive development
- Incident response and compromise assessment
Why IRIS C2 Customers Have the Advantage
While the security community is still analyzing this vulnerability and building proof-of-concepts, IRIS C2 customers have:
- Immediate Access: The module is available now through the Tools menu
- Production-Ready Code: Not a proof-of-concept, but a fully-featured exploitation framework
- Integrated Workflow: Seamlessly integrated into your existing C2 operations
- No External Dependencies: Everything needed is built into the module
- Continuous Updates: As new information emerges, we'll push updates automatically
Getting Started
To access the SharePoint exploit module:
- Update to the latest version of IRIS C2
- Navigate to Tools → SharePoint Exploit (CVE-2025-53770)
- Add target SharePoint servers to scan
- Review the vulnerability information and IOCs
- Begin your assessment
The Bottom Line
With potentially hundreds of thousands of vulnerable SharePoint servers worldwide and no patches currently available, organizations need tools to assess and understand their exposure immediately. IRIS C2's SharePoint exploit module provides security teams with the capability to:
- Quickly identify vulnerable servers in their environment
- Understand the full impact of potential compromise
- Test defensive measures and detection capabilities
- Prepare incident response procedures
As Eye Security noted in their research, this vulnerability is being actively exploited in the wild. Don't wait for patches that may be weeks away – start assessing your SharePoint infrastructure today.
Stay Protected
The IRIS C2 team continues to monitor this evolving situation. We'll provide updates to the module as new information becomes available, including:
- Additional evasion techniques
- New IOCs from active campaigns
- Enhanced post-exploitation capabilities
- Defensive recommendations
Furthermore, we are closely monitoring efforts by defenders to fortify their systems, including the development of new YARA rules to detect this exploit. IRIS C2 is committed to keeping this module updated to overcome these defensive measures, ensuring its continued effectiveness and extending its useful service life for our operators.
For our customers, this is just another example of how IRIS C2 delivers cutting-edge capabilities when you need them most. While others are still reading about vulnerabilities, you're already equipped to exploit them.
To learn more, please contact support@IRISC2.com
IRIS C2 - Professional Command & Control for the Modern Operator
Disclaimer: This tool is for authorized security testing only. Users are responsible for complying with all applicable laws and regulations. Unauthorized access to computer systems is illegal and unethical.