Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-43293 PoC — Wacom driver 后置链接漏洞

Source
Associated Vulnerability
Title:Wacom driver 后置链接漏洞 (CVE-2022-43293)
Description:Wacom driver是一款用于连接和管理平台电脑的驱动程序。 Wacom Driver 6.3.46-1版本存在安全漏洞,该漏洞源于存在任意文件写入漏洞。
Description
Exploit and report for CVE-2022-43293
Readme
# Exploits for CVE-2022-43293
<p align="center">
  <img src="POC_AFW.gif" title="Arbitrary File Write\Overwrite POC">
</p>
<hr>
<p align="center">
  <img src="POC_WDOS.gif" title="Windows Denial of Service POC">
</p>
To get a persistent Windows Denial of Service (as shown in the POC above), simply run <code>Exploit.bat</code> and enter <code>%windir%\system32\cng.sys</code> when you're asked which file you want to overwrite.
<hr>
<a href="https://lucabarile.github.io/Blog/CVE-2022-43293/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Arbitrary File Write\Overwrite Vulnerability</b> report.<br>
<a href="https://lucabarile.github.io/Blog/CVE-2022-43293/index.html#par9" target="_blank" rel="noopener noreferrer">Here</a> you can understand how to use an <b>Arbitrary File Write\Overwrite</b> primitive <b>to</b> achieve a <b>Windows Denial of Service</b>.<br>
<a href="https://www.buymeacoffee.com/LucaBarile" target="_blank" rel="noopener noreferrer">Here</a> you can buy me a unicorn &#129412;
<hr>
<h5 align="right">Share the Knowledge!</h5>
File Snapshot

[4.0K] /data/pocs/945d6518c8fa0395b86e12cd1d8ffe1416e8b076 ├── [4.0K] Exploit │   ├── [115K] CreateMountPoint.exe │   ├── [128K] CreateSymlink.exe │   └── [ 610] Exploit.bat ├── [4.0K] Files │   ├── [4.0K] Plugging │   │   ├── [ 49K] plug1.pcap │   │   └── [ 29K] plug2.pcap │   ├── [4.0K] Unplugging │   │   ├── [ 18K] unplug1.pcap │   │   ├── [ 28K] unplug2.pcap │   │   ├── [ 28K] unplug3.pcap │   │   ├── [ 29K] unplug4.pcap │   │   └── [ 48K] unplug5.pcap │   ├── [132K] update.xml │   └── [ 308] vendor_and_device_ID.txt ├── [1.0K] LICENSE ├── [3.7M] POC_AFW.gif ├── [3.4M] POC_WDOS.gif └── [1.1K] README.md 4 directories, 16 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.