Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-4220 PoC — Android Qualcomm Innovation Center 安全漏洞

Source
Associated Vulnerability
Title:Android Qualcomm Innovation Center 安全漏洞 (CVE-2012-4220)
Description:diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
Description
Obtain root access through CVE-2012-4220
File Snapshot

[4.0K] /data/pocs/11009dadd8476b745d92dfdd9232aa7efc65634b ├── [ 864] AndroidManifest.xml ├── [4.1K] build.xml ├── [4.0K] jni │   ├── [ 677] Android.mk │   ├── [2.7K] common.c │   ├── [1.0K] common.h │   ├── [1.9K] jni.c │   ├── [4.0K] libdiagexploit │   └── [4.7K] main.c ├── [ 781] proguard-project.txt ├── [ 562] project.properties ├── [4.0K] res │   ├── [4.0K] layout │   │   └── [ 496] activity_main.xml │   └── [4.0K] values │   ├── [ 322] strings.xml │   └── [ 86] styles.xml └── [4.0K] src └── [4.0K] com └── [4.0K] example └── [4.0K] diaggetroot └── [3.3K] MainActivity.java 9 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →