Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-37706 PoC — Enlightenment 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Enlightenment 权限许可和访问控制问题漏洞 (CVE-2022-37706)
Description:enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring.
Description
Exploit created by nu11secur1ty (https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2022-37706)
Readme
## Description
Taken from https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2022-37706.

Worked on:

```
Distributor ID: Ubuntu
Description:    Ubuntu 20.04.6 LTS
Release:        20.04
Codename:       focal
```

## USAGE
1) Copy/Upload the exploit to the vulnerable machine.
2) Issue the command `bash ./exploit.sh`
File Snapshot

[4.0K] /data/pocs/5c7461c55227a8a0c8b13c31b8b8ac41b02008eb ├── [1005] exploit.sh └── [ 322] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →