Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-23266 PoC — NVIDIA Container Toolkit 代码问题漏洞

Source
Associated Vulnerability
Title:NVIDIA Container Toolkit 代码问题漏洞 (CVE-2025-23266)
Description:NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service.
Description
cve-2025-23266-migration-bypass
Readme
# cve-2025-23266-migration-bypass
cve-2025-23266-migration-bypass
two method given to get flag's content:
1. copy it from host into container's mounted dir;
2. use reverse shell to get it;
File Snapshot

[4.0K] /data/pocs/1d19d4349738ca52638d72a6ec6eb991ef8a6790 ├── [ 173] build.sh ├── [ 93] Dockerfile ├── [ 11K] LICENSE ├── [ 220] poc.c ├── [1.1K] poc.c_bak └── [ 188] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →