A proof-of-concept for CVE-2025-21479, chained with a Dirty Pagetable technique.FIX ISSUES :-
1. adapt shellcode to disable seccomp
2. adapt to samsung device maybe seprate branch add func of finding kernel base using gpu
3. change README
🤝 Contributing
Pull Requests (PRs) are welcome and greatly appreciated!
Whether it's fixes, improvements, refactoring, or new device support — feel free to contribute.
🚧 Project Status
This project is still Work In Progress (WIP).
I will also be adding:
This includes:
- Researchers whose exploits or techniques inspired parts of the implementation
- Developers whose code was adapted, referenced, or modified
- Community members providing offsets, patches, or device-specific data
- Any open-source projects that contributed ideas or code segments
# DEMONSTRATION
[2025-11-16 15-38-43.webm](https://github.com/user-attachments/assets/a8bcaa8f-1818-48ad-a5f4-e49aef32de77)
## 📚 References
- https://github.com/zhuowei/cheese
- https://xploitbengineer.github.io/CVE-2025-21479
- https://dawnslab.jd.com/android_gpu_attack_cve_2025_21479/#more
[4.0K] /data/pocs/830c49a97f1072df16a33331bc4d7e4beb579f73
├── [4.4K] adrenaline.h
├── [ 65K] exploit.c
├── [4.0K] helpers
│ ├── [3.2K] analyze.c
│ └── [ 12K] extract-kallsyms.c
├── [ 11K] kallsyms_lookup.c
└── [1.0K] README.md
2 directories, 6 files