Windows 2k3 tcpip.sys Privilege Escalation# CVE-2014-4076 PoC
This proof of concept directly copied from its [original python version](http://www.exploit-db.com/exploits/35936/) and rewritten in C++.
## Build
This project is built with Visual Studio 2013 Update 4.
## Notice
Only users that in Administrators group can open the device and perform IO controls, which means **the exploit only escalate Administrators to SYSTEM, and does not help in a webshell environment at all**.
Special thanks to [@KingsleyChen](https://github.com/kingsamchen) for help.
[4.0K] /data/pocs/2f9caef0ba057bcbefa1b15d2037cf7c71f424f1
├── [4.0K] CVE-2014-4076
│ ├── [4.9K] CVE-2014-4076.cpp
│ ├── [4.1K] CVE-2014-4076.vcxproj
│ ├── [1.3K] CVE-2014-4076.vcxproj.filters
│ ├── [ 292] stdafx.cpp
│ ├── [ 305] stdafx.h
│ └── [ 306] targetver.h
├── [1.0K] CVE-2014-4076.sln
└── [ 519] README.md
1 directory, 8 files