Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-4220 PoC — Android Qualcomm Innovation Center 安全漏洞

Source
Associated Vulnerability
Title:Android Qualcomm Innovation Center 安全漏洞 (CVE-2012-4220)
Description:diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
Description
exploit for CVE-2012-4220 working on zte-open
Readme
root-zte-open
=============

exploit for CVE-2012-4220 working on zte-open

Original Advisory: https://www.codeaurora.org/projects/security-advisories/multiple-issues-diagkgsl-system-call-handling-cve-2012-4220-cve-2012
Original Exploit: https://github.com/hiikezoe/break_setresuid

## Build
    $ ndk-build NDK_PROJECT_PATH=. APP_BUILD_SCRIPT=./Android.mk
File Snapshot

[4.0K] /data/pocs/8339174d3f5fee9a11d13f7b8bddd50f3ac901d2 ├── [ 269] Android.mk ├── [4.0K] libdiagexploit │   ├── [ 186] Android.mk │   ├── [6.0K] diag.c │   └── [1.2K] diag.h ├── [4.9K] main.c ├── [ 357] README.md └── [ 34K] su.h 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →