Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21768 PoC — Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability (CVE-2023-21768)
Description:Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description
Exploit implementation with IO Rings for CVE-2023-21768
Readme
# Exploit with IO Rings for CVE-2023-21768

Tested on Windows 22H2 22621.963.

![image](https://github.com/user-attachments/assets/6d098026-2a8e-469f-ade9-d32797fbc9e0)
File Snapshot

[4.0K] /data/pocs/91fd55e47b024e26af3d9c52b2df7cd379d0d351 ├── [ 169] README.md ├── [4.0K] WspSocket │   ├── [6.6K] ClientServerInit.cpp │   ├── [ 13K] Header.h │   ├── [ 24K] IoRingWritePrimitive.cpp │   ├── [ 554] Main.cpp │   ├── [7.8K] WspSocket.vcxproj │   └── [1.2K] WspSocket.vcxproj.filters └── [1.4K] WspSocket.sln 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →