Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21768 PoC — Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability (CVE-2023-21768)
Description:Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description
CVE-2023-21768 Windows 11 22H2 系统本地提权 POC
Readme
# CVE-2023-21768-POC

CVE-2023-21768 Windows 11 22H2 系统本地提权 POC

使用方法:

Windows_AFD_LPE_CVE-2023-21768.exe <pid>

其中是要提升的进程 ID(十进制),导致目标进程被提升到 SYSTEM 权限。


<image src="https://github.com/CKevens/CVE-2023-21768-POC/blob/ca62101b6a95567cf35e04cdedcd3d89ed7f9659/Snipaste_2023-03-22_15-22-43.png">
File Snapshot

[4.0K] /data/pocs/43c57bc50048dc5c26369b2f363b62dda0eb96b4 ├── [ 373] README.md ├── [560K] Snipaste_2023-03-22_15-22-43.png ├── [140K] Windows_AFD_LPE_CVE-2023-21768_x64.exe └── [114K] Windows_AFD_LPE_CVE-2023-21768_x86.exe 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →