Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2025-31200 - @Noahhw46 figured it out | https://github.com/zhuowei/apple-positional-audio-codec-invalid-header | POC Details |
| 2 | Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file. | https://github.com/JGoyd/CVE-2025-31200-iOS-AudioConverter-RCE | POC Details |
| 3 | IOS audio buffer overflow CVE-2025-31200 POC | https://github.com/hunters-sec/CVE-2025-31200 | POC Details |
| 4 | CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalation (CVE-2025-31201), and allowed token theft until patched in iOS 18.4.1 (Apr 16, 2025). | https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201 | POC Details |
| 5 | Public disclosure of CVE-2025-31200 – Zero-click RCE in iOS 18.X via AudioConverterService and malicious audio file. | https://github.com/serundengsapi/CVE-2025-31200-iOS-AudioConverter-RCE | POC Details |
No public POC found.
Login to generate AI POCNo comments yet