Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-4220 PoC — Android Qualcomm Innovation Center 安全漏洞

Source
Associated Vulnerability
Title:Android Qualcomm Innovation Center 安全漏洞 (CVE-2012-4220)
Description:Google Chrome是美国谷歌(Google)公司开发的一款Web浏览器。Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。 Android 2.3至4.2版本中的Qualcomm Innovation Center (QuIC) Diagnostics (又名DIAG)内核模式驱动程序中的diagchar_core.c中存在漏洞。远程攻击者利用该漏洞通过使用diagchar_ioctl调用中的特制的参数的应用程序,执行任意代
Description
Obtain root access through CVE-2012-4220
File Snapshot

[4.0K] /data/pocs/11009dadd8476b745d92dfdd9232aa7efc65634b ├── [ 864] AndroidManifest.xml ├── [4.1K] build.xml ├── [4.0K] jni │   ├── [ 677] Android.mk │   ├── [2.7K] common.c │   ├── [1.0K] common.h │   ├── [1.9K] jni.c │   ├── [4.0K] libdiagexploit │   └── [4.7K] main.c ├── [ 781] proguard-project.txt ├── [ 562] project.properties ├── [4.0K] res │   ├── [4.0K] layout │   │   └── [ 496] activity_main.xml │   └── [4.0K] values │   ├── [ 322] strings.xml │   └── [ 86] styles.xml └── [4.0K] src └── [4.0K] com └── [4.0K] example └── [4.0K] diaggetroot └── [3.3K] MainActivity.java 9 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.