Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21768 PoC — Microsoft Windows Ancillary Function Driver for WinSock 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Ancillary Function Driver for WinSock 安全漏洞 (CVE-2023-21768)
Description:Microsoft Windows Ancillary Function Driver for WinSock是美国微软(Microsoft)公司的Winsock 的辅助功能驱动程序。 Microsoft Windows Ancillary Function Driver for WinSock存在安全漏洞。攻击者利用该漏洞可以提升权限。
Description
CVE-2023-21768 Proof of Concept
Readme
CVE-2023-21768

OS information
```cmd
OS 名称:          Microsoft Windows 11 专业版
OS 版本:          10.0.22621 暂缺 Build 22621
```

LPE
<div align="center">
<img src="./imgs/exploit.png"/>
</div>
File Snapshot

[4.0K] /data/pocs/9eb9e55e1211889e266e20c36b0a8d43621b079c ├── [9.1M] afd.sys.i64 ├── [ 28K] CVE-2023-21768.md ├── [4.0K] Exploit │   ├── [4.0K] Exploit │   │   ├── [ 13K] Exploit.cpp │   │   ├── [6.5K] Exploit.vcxproj │   │   ├── [1.1K] Exploit.vcxproj.filters │   │   └── [8.9K] types.hpp │   └── [1.4K] Exploit.sln ├── [4.0K] imgs │   ├── [ 72K] afd_diff.png │   ├── [115K] bindiff.png │   ├── [157K] exploit.png │   ├── [344K] ioring_sq.png │   └── [195K] submit_queue.png └── [ 218] README.md 3 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.