Researchers ‘break’ Edge with zero-day remote code exploit
Proof-of-concept shows researchers opening the Chrome landing page from Edge via Firefox


Security researchers have teased a zero-day exploit for Microsoft's Edge browser that can allow a malicious actor to run commands on a user's machine.
Two vulnerabilities, discovered by exploit developer Yushi Laing with help from Alexander Kochkov, could allow an anonymous user execute code remotely, and potentially seize control of a user's device.
Laing teased the "stable exploit" for the Microsoft-developed web browser last week with an image that appeared to show the Windows Calculator app launched from a web browser, after working on the project for just under a week.
The researcher had initially been looking into three remote code execution bugs for Firefox as part of an 'exploit chain', but struggled to establish code for the third. He then found two similar flaws on Microsoft Edge using the Wadi Fuzzer app developed by SensePost.
Laing told BleepingComputer the pair wanted to develop a stable exploit for Microsoft Edge and escape the sandbox, termed as an exploit that force-crashes and incorrectly reloads an app with manipulated permissions.
This would allow a user to run functions, and access other apps, beyond its normal permissions, as well as access data from other applications. They were also looking for a way to effectively seize control of a machine by escalating execution privileges to 'system'.
They published a proof-of-concept for the Edge exploit in a short clip which shows the team using the browser to open the landing page for Google Chrome via Firefox.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Microsoft previously left a zero-day Edge exploit unpatched for 90 days, which led to Google's Project Zero security team publishing the full details.
The flaw was nowhere near as severe as a remote code execution bug, rather it allowed an attacker who had already seized control of a browser to bypass a second layer of security.
Laing said the pair will not go public with their latest Edge exploit until they finalise their write-up.
"Microsoft has a strong commitment to security and a demonstrated track record of investigating and providing resolution as soon as possible," Microsoft's senior director Jeff Jones told IT Pro.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Marc Benioff’s agentic AI gambit is paying dividends
Analysis Agentforce is dominating the agenda at Salesforce – and it appears to be working
-
Enterprises are worried about agentic AI security risks – Gartner says the answer is just adding more AI agents
News Not content with deploying agents for frontline operations, some enterprises might double down with ‘guardian agents’ to monitor their bot-based workforces
-
The threat prevention buyer's guide
Whitepaper Find the best advanced and file-based threat protection solution for you
-
Supply chain as kill chain
Whitepaper Security in the era Zero Trust
-
Microsoft under fire for “negligent” security practices in scathing critique by industry exec
News Microsoft took more than 90 days to issue a partial fix for a critical Azure vulnerability, researchers found
-
Apple patches zero day linked to spyware campaign
News Kaspersky researchers were the first to report a zero day used in a sophisticated attack chain
-
Should your business start a bug bounty program?
In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
-
MOVEit cyber attack: Cl0p sparks speculation that it’s lost control of hack
News The hackers return with their second major data-extortion attack of 2023, but may have bitten off more than they can chew
-
Microsoft says it knows who was behind cyber attacks on MOVEit Transfer
Dozens of organizations may have already lost data to hackers exploiting the critical flaw
-
Trend Micro security predictions for 2023
Whitepaper Prioritise cyber security strategies on capabilities rather than costs