Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-32162 PoC — Wacom driver 安全漏洞

Source
Associated Vulnerability
Title:Wacom driver 安全漏洞 (CVE-2023-32162)
Description:Wacom driver是一款用于连接和管理平台电脑的驱动程序。 Wacom Drivers for Windows 存在安全漏洞,该漏洞源于WacomInstallI.txt 文件的权限不正确,PrefUtil.exe 程序处理 WacomInstallI.txt 文件时存在特定缺陷,攻击者利用此漏洞可以提升权限并在 SYSTEM 上下文中执行任意代码。
Description
Exploits and reports for CVE-2023-32162
Readme
# Exploits for CVE-2023-32162 (ZDI-CAN-16318) [0-day]

<p align="center">
  <img src="LPE/POC.gif" title="IGPF loads the barol92 json files locally">
</p>
<hr>
<a href="https://lucabarile.github.io/Blog/ZDI-CAN-16318/lpe/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Local Privilege Escalation Vulnerability</b> report.<br>
<a href="https://lucabarile.github.io/Blog/ZDI-CAN-16318/arb_r/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Arbitrary File Read Vulnerability</b> report.<br>
<a href="https://lucabarile.github.io/Blog/ZDI-CAN-16318/arb_rw/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Arbitrary File Read\Write Vulnerability</b> report.<br>
<hr>
<a href="https://www.buymeacoffee.com/LucaBarile" target="_blank" rel="noopener noreferrer">Here</a> you can buy me a unicorn &#129412;
<hr>
<h5 align="right">Share the Knowledge!</h5>
File Snapshot

[4.0K] /data/pocs/4525ec67bfdc34dbe8186bba97b9033fef407754 ├── [4.0K] ARB_R │   ├── [257K] Exploit.exe │   └── [1015K] Visual Studio Project.zip ├── [4.0K] ARB_RW │   ├── [266K] Exploit.exe │   └── [1.0M] Visual Studio Project.zip ├── [1.0K] LICENSE ├── [4.0K] LPE │   ├── [ 12K] Exploit.exe │   ├── [3.7M] POC.gif │   └── [ 58K] Visual Studio Project.zip ├── [ 947] README.md └── [4.0K] WacomTablet_6.3.45-1 ├── [ 15M] WacomTablet_6.3.45-1.7z.001 └── [ 13M] WacomTablet_6.3.45-1.7z.002 4 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.