Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-48799 PoC — Windows Update Service Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Windows Update Service Elevation of Privilege Vulnerability (CVE-2025-48799)
Description:Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.
Description
Sample exploit of patched vulnerability 
Readme
# CVE-2025-48799 – Apache Tomcat Remote Code Execution (PoC)

This repository contains a proof-of-concept exploit for CVE-2025-48799, a remote code execution vulnerability discovered in Apache Tomcat 9.0.48. The flaw stems from an integer overflow in the HTTP header parser, which can be triggered by a specially crafted `X-Forwarded` header.

---

## Purpose

This project was created for educational and research purposes only. It demonstrates:
* How malformed HTTP headers can lead to memory corruption
* Techniques for crafting shellcode and calculating buffer offsets
* A practical example of exploiting a real-world patched CVE in a controlled environment

---

##  How It Works

The exploit:
1. Constructs an oversized `X-Forwarded` header to trigger an integer overflow
2. Injects shellcode into the corrupted memory region
3. Sends the payload using libcurl to a vulnerable Tomcat instance

---

## Ethical Disclaimer

This code is intended strictly for educational use in lab environments. Do not deploy or test this exploit on systems you do not own or have explicit permission to audit. I support responsible disclosure and ethical hacking practices.

---

## Files

- `cve_2025-48799.c` – Main exploit code
- `.gitignore` – Keeps build artifacts out of version control
- `LICENSE` – MIT license for open use
- `README.md` – Project overview and usage guidelines

---

## Author

Created by Mark Mallia mrk336.  
I’m passionate about cybersecurity, reverse engineering, and building tools that help us understand how systems break—and how to make them stronger.

If you're a recruiter or hiring manager, feel free to reach out via GitHub or LinkedIn. I'd love to bring this mindset to your team.

---

## Contact

- GitHub: [github.com/mrk336](https://github.com/mrk336)
- LinkedIn: https://www.linkedin.com/in/mark-anthony-mallia-14115561/
File Snapshot

[4.0K] /data/pocs/b1e2436ab9e803b94555f1f80fee3eae79072996 ├── [4.9K] exploit_tomcat_48799.c ├── [1.0K] LICENSE └── [1.8K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →