Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-19320 PoC — 多款GIGABYTE产品访问控制错误漏洞

Source
Associated Vulnerability
Title:多款GIGABYTE产品访问控制错误漏洞 (CVE-2018-19320)
Description:GIGABYTE APP Center等都是中国技嘉科技(GIGABYTE Technology)公司的产品。GIGABYTE APP Center是一款用于管理、更新技嘉产品工具程序的软件。AORUS GRAPHICS ENGINE是一款显卡超频软件。 多款GIGABYTE产品中的GDrv低级别驱动程序存在安全漏洞。攻击者可利用该漏洞完全控制受影响的系统。以下产品和版本受到影响:GIGABYTE APP Center 1.05.21及之前版本;AORUS GRAPHICS ENGINE 1.33及之前版
Description
Unsigned driver loader using CVE-2018-19320
Readme
<h1>GDRVLoader - Load Unsigned Drivers Windows 10-11</h1>
<p>Originally based from https://github.com/fengjixuchui/gdrv-loader but with improvements and support for latest windows versions.</p>
<h2>Added Features</h2>
<ul>
  <li>Load unsigned drivers on Windows 10-11 without getting caught by PatchGuard.</li>
  <li>Improved portability through the addition of byte loading for the vulnerable driver</li>
  <li>CRT compatibility, for cleaner code and easier usage.</li>
  <li>Simple and user-friendly command-line interface</li>
</ul>
<h2>Usage</h2>
<ol>
  <li>Download the latest release.</li>
  <li>a) Drag the target driver into GDRVLoader.exe. <br> b) Run the tool from the cmd using administrator privileges with command "GDRVLoader.exe TargetDriver.sys".</li>
  <li>Enter load/LOAD or unload/UNLOAD in the command prompt.</li>
</ol>
<h2>Images</h2>
<div>
  <img src="https://i.imgur.com/Lp0sHdQ.png" alt="ok">
</div>
File Snapshot

[4.0K] /data/pocs/15117f207440792fb7cae38483c3f971a49273a0 ├── [4.0K] binary │   ├── [158K] bytes.h │   └── [ 528] dropper.h ├── [4.0K] exploit │   ├── [5.9K] pe.cpp │   └── [ 17K] swind2.cpp ├── [1.2K] GDRVLoader.cpp ├── [ 901] GDRVLoader.sln ├── [7.6K] GDRVLoader.vcxproj ├── [1.5K] GDRVLoader.vcxproj.filters ├── [ 168] GDRVLoader.vcxproj.user ├── [4.9K] global.h ├── [4.0K] hde │   ├── [9.7K] hde64.c │   ├── [2.6K] hde64.h │   └── [3.6K] table64.h ├── [ 924] README.md └── [4.0K] utils └── [231K] ntdll.h 4 directories, 15 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.