Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-41772 PoC — Win32k Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Win32k Elevation of Privilege Vulnerability (CVE-2023-41772)
Description:Win32k Elevation of Privilege Vulnerability
Readme
# CVE-2023-41772 / UIFuckUp

UIFuckUp exploit to gain system privileges as user on Windows 10 (1809 and up) and 11.

How To:
1. Compile uiaccess_exploit.exe and uiaccess_exploit.dll
2. Create directory C:\exploit
3. Place uiaccess_exploit.exe, uiaccess_exploit.dll and JuciyPotatoNG.exe in C:\exploit
4. Run C:\Exploit\uiaccess_exploit.exe as a non-admin user
5. Wait for a command prompt running as system

Reference: https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-41772
File Snapshot

[4.0K] /data/pocs/b4b7a25176f3bbfcb226a831fe344893529931b9 ├── [ 410] exploit_cleanup.bat ├── [ 81] Needs_JuicyPotatoNG.txt ├── [ 489] README.md ├── [ 12K] uiaccess_exploit.c ├── [4.0K] uiaccess_exploit_dll │   ├── [1.5K] uiaccess_exploit_dll.c │   ├── [8.2K] uiaccess_exploit_dll.vcxproj │   └── [1.1K] uiaccess_exploit_dll.vcxproj.filters ├── [2.2K] uiaccess_exploit.sln ├── [7.0K] uiaccess_exploit.vcxproj └── [ 966] uiaccess_exploit.vcxproj.filters 1 directory, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →