Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22555 PoC — Heap Out-Of-Bounds Write in Netfilter IP6T_SO_SET_REPLACE

Source
Associated Vulnerability
Title:Heap Out-Of-Bounds Write in Netfilter IP6T_SO_SET_REPLACE (CVE-2021-22555)
Description:A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
Description
This repo hosts TUKRU's Linux Privilege Escalation exploit (CVE-2021-22555). It demonstrates gaining root privileges via a vulnerability. Tested on Ubuntu 5.8.0-48-generic and COS 5.4.89+. Use responsibly and ethically.
Readme
# CVE-2021-22555
This repo hosts TUKRU's Linux Privilege Escalation exploit (CVE-2021-22555). It demonstrates gaining root privileges via a vulnerability. Tested on Ubuntu 5.8.0-48-generic and COS 5.4.89+. Use responsibly and ethically.
CVE-2021-22555: Linux Privilege Escalation Exploit

![GitHub](https://img.shields.io/github/license/tukru/CVE-2021-22555)
![GitHub top language](https://img.shields.io/github/languages/top/tukru/CVE-2021-22555)
![GitHub last commit](https://img.shields.io/github/last-commit/tukru/CVE-2021-22555)

This repository contains a Linux Privilege Escalation exploit for the CVE-2021-22555 vulnerability. The exploit leverages a vulnerability in the Linux kernel to escalate privileges.

## Disclaimer

This code is for educational and ethical testing purposes only. Misuse of this software can lead to criminal charges. The authors and contributors are not responsible for any damages caused by the misuse of this software.

## Prerequisites

- Linux system with a vulnerable kernel
- Basic knowledge of C and Linux system programming

## Installation

1. Clone the repository:

git clone https://github.com/tukru/CVE-2021-22555.git


2. Navigate to the repository:

cd CVE-2021-22555


3. Compile the code:

gcc -o exploit exploit.c


## Usage

Run the compiled binary with necessary privileges:

./exploit



## Contributing

Contributions are welcome. Please open an issue or submit a pull request.
File Snapshot

[4.0K] /data/pocs/a4926fc8d761582ccd64f8180f4f201b90496694 ├── [ 22K] exploit.c ├── [ 34K] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →