Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2431 PoC — Android Qualcomm TrustZone 权限许可和访问控制漏洞

Source
Associated Vulnerability
Title:Android Qualcomm TrustZone 权限许可和访问控制漏洞 (CVE-2016-2431)
Description:The Qualcomm TrustZone component in Android before 2016-05-01 on Nexus 5, Nexus 6, Nexus 7 (2013), and Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 24968809.
Description
Qualcomm TrustZone kernel privilege escalation
Readme
# cve-2016-2431
Qualcomm TrustZone kernel privilege escalation
File Snapshot

[4.0K] /data/pocs/199862da95269180905e5b05267ace6ec5c63a0c ├── [4.0K] jni │   ├── [ 250] Android.mk │   ├── [ 27] Application.mk │   ├── [ 150] build_shellcode.sh │   ├── [1.2K] defs.h │   ├── [ 12K] exploit_utilities.c │   ├── [4.7K] exploit_utilities.h │   ├── [1.7K] main.c │   ├── [2.0K] QSEEComAPI.c │   ├── [ 11K] QSEEComAPI.h │   ├── [ 140] qsee_syscalls.h │   ├── [ 48] shellcode.S │   ├── [5.7K] symbols.h │   ├── [7.9K] tzbsp_exploit.c │   ├── [2.9K] tzbsp_exploit.h │   ├── [1.4K] tzbsp_symbols.h │   ├── [2.1K] vuln.c │   ├── [ 529] vuln.h │   ├── [4.4K] widevine_commands.c │   └── [2.5K] widevine_commands.h ├── [ 15K] LICENSE └── [ 63] README.md 1 directory, 21 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →