Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1054 PoC — Microsoft Windows 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 缓冲区错误漏洞 (CVE-2020-1054)
Description:An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.
Description
LPE for CVE-2020-1054 targeting Windows 7 x64
Readme
# CVE-2020-1054
CVE-2020-1054 LPE for Windows 7x64

![image 1](demo.gif)

## Usage 

Install Rust if you need it https://www.rust-lang.org/learn/get-started

Compile the code:

`cargo build --release`

Copy the .exe from `target/release/` to target and execute.

### Windows KB

If a specific Windows KB is not installed slight changes to the exploit are required. These are noted in two places via comments. I will update what the specific KB is shortly.

## Additional Information
* https://0xeb-bp.github.io/blog/2020/06/15/cve-2020-1054-analysis.html
File Snapshot

[4.0K] /data/pocs/d5dca1512affc06111e93ac4a5045c4cd93b38a2 ├── [ 390] Cargo.toml ├── [7.0M] demo.gif ├── [ 555] README.md └── [4.0K] src └── [ 14K] main.rs 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →