Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-1675 PoC — Windows Print Spooler Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Windows Print Spooler Remote Code Execution Vulnerability (CVE-2021-1675)
Description:Windows Print Spooler Remote Code Execution Vulnerability
Description
C# PrintNightmare (CVE-2021-1675)
Readme
# C# PrintNightmare (CVE-2021-1675)

You'll need a DLL to use SharpPN. So once you have that, just build and specify the dll path in the command-line arguments.

## Build  
You can build yourself with `C:\Windows\Microsoft.NET\Framework64\v3.5\csc.exe -out:SharpPN.exe C:\Path\to\Program.cs` or by opening the .sln file with Visual Studio and building there.

## Usage  
`.\SharpPN.exe -DLL C:\path\to\your\dll`  

![Alt text](/images/SharpPN_Working.PNG)


### References  
Caleb Stewart & John Hammond's PowerShell PoC: https://github.com/calebstewart/CVE-2021-1675
File Snapshot

[4.0K] /data/pocs/1dfe09f6c3dda74e8f930523ba85b95c2ba8bdea ├── [4.0K] images │   └── [ 24K] SharpPN_Working.PNG ├── [ 34K] LICENSE ├── [4.6K] Program.cs ├── [4.0K] Properties │   └── [1.4K] AssemblyInfo.cs ├── [ 568] README.md ├── [2.1K] SharpPN.csproj └── [1.1K] SharpPN.sln 2 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →