Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-40109 PoC — Google Android 安全漏洞

Source
Associated Vulnerability
Title:Google Android 安全漏洞 (CVE-2023-40109)
Description:In createFromParcel of UsbConfiguration.java, there is a possible background activity launch (BAL) due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
File Snapshot

[4.0K] /data/pocs/c5b4809785880f4576949a5eb20d76fb7932f81d ├── [5.6K] AccessoryFilter.java ├── [ 14K] DeviceFilter.java ├── [4.8K] IUsbManager.aidl ├── [ 790] IUsbSerialReader.aidl ├── [ 643] package.html ├── [ 682] ParcelableUsbPort.aidl ├── [4.3K] ParcelableUsbPort.java ├── [ 677] UsbAccessory.aidl ├── [8.8K] UsbAccessory.java ├── [6.1K] UsbConfiguration.java ├── [6.0K] UsbConstants.java ├── [ 674] UsbDevice.aidl ├── [ 15K] UsbDeviceConnection.java ├── [ 14K] UsbDevice.java ├── [ 676] UsbEndpoint.aidl ├── [4.9K] UsbEndpoint.java ├── [ 677] UsbInterface.aidl ├── [6.1K] UsbInterface.java ├── [ 33K] UsbManager.java ├── [ 12K] UsbPort.java ├── [ 678] UsbPortStatus.aidl ├── [ 13K] UsbPortStatus.java └── [ 14K] UsbRequest.java 0 directories, 23 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →