Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-31200 PoC — Apple iOS和Apple iPadOS 安全漏洞

Source
Associated Vulnerability
Title:Apple iOS和Apple iPadOS 安全漏洞 (CVE-2025-31200)
Description:A memory corruption issue was addressed with improved bounds checking. This issue is fixed in iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1, visionOS 2.4.1, watchOS 11.5. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS released before iOS 18.4.1.
Description
Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file.
Readme
# CVE-2025-31200 – iOS AudioConverterService Zero-Click RCE

Public disclosure of CVE-2025-31200 – a zero-click remote code execution (RCE) vulnerability in Apple's iOS 18.X, specifically within the `AudioConverterService` component. The vulnerability is triggered by a malicious audio file delivered via iMessage or SMS, requiring no user interaction.

---

##  Disclosure & Patch Timeline

- **Initial Report Date:** January 21, 2025  
- **Reported To:** US-CERT (Tracking ID: VRF#25-01-MPVDT)  
- **Patched By Apple:** Silently resolved in **iOS 18.4.1**, released **April 16, 2025**  
- **CVE Assignment:** Identifier **CVE-2025-31200** is used publicly due to lack of MITRE response  
- **Acknowledgment:** No public credit or acknowledgment provided by Apple or MITRE as of May 18, 2025  

Due to the severity of the vulnerability, prolonged silence from relevant stakeholders, and lack of credit or transparency post-patch, this repository is being published to inform the security community and support defensive mitigation.

---

##  Affected Systems

- **Product:** iPhone 15 Pro Max (others likely affected)  
- **iOS Versions:** iOS 18.2.1, iOS 18.3 Beta  
- **Patched Version:** iOS 18.4.1 (April 16, 2025)  
- **Vulnerable Component:** `AudioConverterService` via iMessage / SMS processing

---

##  Contents

- `Remote-Audio-Exploit-iOS-15ProMax-iOS18x.md` – Full technical write-up including:  
  - Attack chain  
  - Simulated proof-of-concept (PoC)  
  - Log timeline and decrypted token leakage  
  - Privilege escalation and AWDL DoS impact

No weaponized exploit code or malicious payloads are provided. This repository is for documentation and defense only.

---

## 🛡️ Disclaimer

This report is released in the interest of public safety, transparency, and to support defenders and researchers. All information is based on independent research. No offensive code is included. The author remains open to coordination with trusted parties for validation and response.


File Snapshot

[4.0K] /data/pocs/97402c36039af0ad191df5d0b64b34fedf5e5afa ├── [2.0K] README.md └── [6.3K] Remote-Audio-Exploit-iOS-15ProMax-iOS18x.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →