Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-0075 PoC — Microsoft Windows Hyper-V 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Hyper-V 安全漏洞 (CVE-2017-0075)
Description:Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0109.
Description
PoC for CVE-2017-0075
Readme
# HyperV
Almost one year ago, I wrote a PoC for CVE-2017-0075 after had read Jordan Rabet's blackhat talk. But I've no time to make a working exploit:(.



File Snapshot

[4.0K] /data/pocs/3d289cbeb1562606cab7924bc60a6c7cd69f1754 ├── [333K] Demo.mp4 ├── [ 156] README.md ├── [4.0K] ring0 │   └── [4.0K] hyperv │   ├── [1.5M] hv_netvsc.ko │   ├── [ 606] hv_netvsc.mod.c │   ├── [ 903] hyper_v.h │   ├── [ 37K] hyperv_net.h │   ├── [ 164] Kconfig │   ├── [ 93] Makefile │   ├── [ 39] modules.order │   ├── [ 38K] netvsc.c │   ├── [ 61K] netvsc_drv.c │   └── [ 37K] rndis_filter.c ├── [4.0K] ring3 │   ├── [8.4K] hyper_v │   ├── [8.4K] hyper_v2 │   ├── [1.1K] hyper_v2.c │   ├── [2.6K] hyper_v.c │   └── [ 56] hyper_v.h └── [ 64] run.sh 3 directories, 18 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →