Below <v0.9.0 PoC Privilege Escalation Exploit# CVE-2025-27591
## Below <v0.9.0 PoC Privilege Escalation Exploit
## Disclaimer
This exploit is intended for **educational purposes only**. It is designed to help users understand security vulnerabilities and improve their knowledge of cybersecurity. The author does not condone any illegal activities or unauthorized access to systems. Use this information responsibly and only in environments where you have explicit permission to test.
## Description:
A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
[4.0K] /data/pocs/1806cc14be4874bc4067ee54946146d1363d5349
├── [1.2K] exploit.sh
└── [ 758] README.md
0 directories, 2 files