Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This is a proof of concept for CVE-2025-38352, a vulnerability in the Linux kernel's POSIX CPU timers implementation. The September 2025 Android Bulletin mentions that this vulnerability has been used in limited, targeted exploitation in the wild. | https://github.com/farazsth98/poc-CVE-2025-38352 | POC Details |
| 2 | Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable Linux kernels v5.10.x. | https://github.com/farazsth98/chronomaly | POC Details |
| 3 | None | https://github.com/Crime2/poc-CVE-2025-38352 | POC Details |
| 4 | 🛠️ Exploit the CVE-2025-38352 vulnerability in the Android/Linux kernel with Chronomaly, designed for efficient use on vulnerable v5.10.x kernels. | https://github.com/Soikoth3010/chronomaly | POC Details |
| 5 | 🚀 Exploit the Android/Linux kernel using CVE-2025-38352 with Chronomaly, designed for vulnerable v5.10.x kernels without needing specific offsets. | https://github.com/Soikoth3010/soikoth3010.github.io | POC Details |
| 6 | The official Sentinel Edition v7.11 - Hypervisor Detection & Kernel Memory Audit Suite for Honor Magic V2. Investigating CVE-2025-38352 and EL2 RKP defenses. | https://github.com/jordelmir/Elysium-Vanguard-Sentinel-Audit | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.