Exploits and reports for CVE-2023-32162# Exploits for CVE-2023-32162 (ZDI-CAN-16318) [0-day]
<p align="center">
<img src="LPE/POC.gif" title="IGPF loads the barol92 json files locally">
</p>
<hr>
<a href="https://lucabarile.github.io/Blog/ZDI-CAN-16318/lpe/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Local Privilege Escalation Vulnerability</b> report.<br>
<a href="https://lucabarile.github.io/Blog/ZDI-CAN-16318/arb_r/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Arbitrary File Read Vulnerability</b> report.<br>
<a href="https://lucabarile.github.io/Blog/ZDI-CAN-16318/arb_rw/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Arbitrary File Read\Write Vulnerability</b> report.<br>
<hr>
<a href="https://www.buymeacoffee.com/LucaBarile" target="_blank" rel="noopener noreferrer">Here</a> you can buy me a unicorn 🦄
<hr>
<h5 align="right">Share the Knowledge!</h5>
[4.0K] /data/pocs/4525ec67bfdc34dbe8186bba97b9033fef407754
├── [4.0K] ARB_R
│ ├── [257K] Exploit.exe
│ └── [1015K] Visual Studio Project.zip
├── [4.0K] ARB_RW
│ ├── [266K] Exploit.exe
│ └── [1.0M] Visual Studio Project.zip
├── [1.0K] LICENSE
├── [4.0K] LPE
│ ├── [ 12K] Exploit.exe
│ ├── [3.7M] POC.gif
│ └── [ 58K] Visual Studio Project.zip
├── [ 947] README.md
└── [4.0K] WacomTablet_6.3.45-1
├── [ 15M] WacomTablet_6.3.45-1.7z.001
└── [ 13M] WacomTablet_6.3.45-1.7z.002
4 directories, 11 files