POC详情: 31cdab4c5147832507a185a682a03e22597b3d38

来源
关联漏洞
标题: Apple iPadOS 安全漏洞 (CVE-2025-24203)
描述:Apple iPadOS是美国苹果(Apple)公司的一套用于iPad平板电脑的操作系统。 Apple iPadOS存在安全漏洞,该漏洞源于检查不足,可能导致修改文件系统受保护部分。
描述
Basic customization app using CVE-2025-24203. Patched in iOS 18.4.
介绍
# dirtyZero
**A simple customization toolbox, utilizing [CVE-2025-24203](https://project-zero.issues.chromium.org/issues/391518636)**

[Download](https://github.com/jailbreakdotparty/dirtyZero/releases) • [Join our Discord!](https://discord.gg/XPj66zZ4gT)

# Disclaimer
All file modifications are done in memory. If something goes wrong or you want to revert the tweaks, just force reboot your phone.

# Support Table
| iOS Version | Support Status |
| -------- | ------- |
| iOS 16.0 - iOS 16.7.10  | Supported |
| iOS 17.0 - iOS 17.7.5 | Supported |
| iOS 17.7.6+ | Not Supported |
| iOS 18.0 - iOS 18.3.2 | Supported |
| iOS 18.4+ | Not Supported |

# How can I respring after I apply the changes?
There are 2 methods to manually respring your device. Method 1 is the most reliable, use it if you can.

**Method 1: Use fancy respring app**
1. Install [respringapp.ipa](https://github.com/jailbreakdotparty/dirtyZero/releases/download/respringapp/respringapp.ipa).
2. Try to open the app from the Home Screen.
3. You should get an instant respring 🔥.

*This method brought to you by [`@nyaathea`](https://x.com/nyaathea). Due to the nature of the method, it is not possible to integrate this directly into the dirtyZero app, hence the seperate IPA.*

**Method 2: Display & Text Size**
1. Before applying the tweaks, go into Settings > Display & Brightness > Display Zoom
2. Pick the option that's opposite of the one you're currently using.
3. After, apply the tweaks.
4. Go back into Settings > Display & Brightness > Display Zoom
5. Pick the option that's opposite of the one you're currently using.


# Credits
- [Skadz](https://github.com/skadz108) for making this app.
- [lunginspector](https://github.com/lunginspector) for the UI and numerous tweaks.
- Ian Beer of Google Project Zero for discovering and publishing the exploit.
文件快照

[4.0K] /data/pocs/31cdab4c5147832507a185a682a03e22597b3d38 ├── [4.0K] dirtyZero │   ├── [3.4K] Alertinator.swift │   ├── [4.0K] Assets.xcassets │   │   ├── [4.0K] AccentColor.colorset │   │   │   └── [ 326] Contents.json │   │   ├── [4.0K] AppIcon.appiconset │   │   │   ├── [ 647] Contents.json │   │   │   └── [ 95K] IMG_0210.png.jpeg │   │   └── [ 63] Contents.json │   ├── [ 304] bridge.h │   ├── [6.4K] Color++.swift │   ├── [ 26K] ContentView.swift │   ├── [ 262] dirtyZeroApp.swift │   ├── [ 587] Haptics++.swift │   ├── [1.7K] LogView.swift │   └── [2.4K] unwire_mlock_poc.swift ├── [4.0K] dirtyZero.xcodeproj │   ├── [ 13K] project.pbxproj │   ├── [4.0K] project.xcworkspace │   │   ├── [ 135] contents.xcworkspacedata │   │   └── [4.0K] xcshareddata │   │   └── [4.0K] swiftpm │   │   └── [ 385] Package.resolved │   └── [4.0K] xcuserdata │   └── [4.0K] skadz.xcuserdatad │   └── [4.0K] xcschemes │   └── [ 344] xcschememanagement.plist ├── [2.1K] ipabuild.sh ├── [ 34K] LICENSE └── [1.8K] README.md 11 directories, 19 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。