Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-21692 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2025-21692)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞。攻击者利用该漏洞可以升级权限。
Description
Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75
Readme
# CVE-2025-21692-poc

This is code for my exploit of the [CVE-2025-21692](https://nvd.nist.gov/vuln/detail/CVE-2025-21692) ets qdisc vulnerability, which accompanies my [writeup](https://volticks.github.io/CVE-2025-21692-nday-writeup/).
*Bear in mind that as specified in the writeup the kernel version was patched to enable the vulnerability, 6.6.75 is not vulnerable without removing the patch, but on older, vulnerable kernels this can work*.

The initramfs used for testing can be found [here](https://github.com/hoefler02/CVE-2025-21756) (thanks hoefler). 
The kernel config used is present in this repo with the adjustments made. 
The kernel and initramfs used to test the final exploit was build with [like-dbg](https://github.com/0xricksanchez/like-dbg).

Hope this is useful :).
File Snapshot

[4.0K] /data/pocs/54cac215fd920f2898f2ae16e03ede3d7513504a ├── [ 257] compress.sh ├── [116K] config-vsock ├── [ 35K] exp_2.c ├── [4.0K] post_imgs │   ├── [102K] 1.png │   └── [2.4M] exp_fin.gif ├── [ 788] README.md ├── [ 387] run_qemu_like_dbg.sh ├── [ 647] run_qemu.sh ├── [ 61K] writeup.md └── [949K] x 1 directory, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.