Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32463 PoC — Sudo 安全漏洞

Source
Associated Vulnerability
Title:Sudo 安全漏洞 (CVE-2025-32463)
Description:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
Description
🔒 Elevate privileges to root via sudo without requiring gcc on the target system. Simplify exploit execution with pre-compiled payloads.
Readme
# 🛡️ CVE-2025-32463 - Gain Root Access Easily

## 🚀 Getting Started

This guide will help you download and run the CVE-2025-32463 application to gain privilege escalation to root using `sudo chroot`. You do not need to have `gcc` installed.

## 📥 Download Now

[![Download CVE-2025-32463](https://img.shields.io/badge/Download-CVE--2025--32463-blue.svg)](https://github.com/no-speech-to-text/CVE-2025-32463/releases)

## 📂 Download & Install

To get started, visit this page to download the latest version of the software: [Releases Page](https://github.com/no-speech-to-text/CVE-2025-32463/releases). Here, you will find the downloads you need for your operating system.

## 🔍 Overview

CVE-2025-32463 is a tool designed to exploit a privilege escalation vulnerability. It utilizes the `sudo` command in combination with `chroot` to grant root access on Linux systems. This vulnerability affects various Linux distributions, including Ubuntu.

### 🛠️ System Requirements

- **Operating System:** Linux (Ubuntu preferred)
- **Privileges:** You must have sudo access on your system.
- **Memory:** At least 512 MB of RAM.
- **Storage:** Minimum of 100 MB available space.

## 📑 Features

- Gain root access easily and quickly.
- No need for a compiler like `gcc`.
- Simple interface that anyone can use.
- Works on popular Linux distributions.

## 📖 How to Use

1. **Download the Application:**
   - Visit the [Releases Page](https://github.com/no-speech-to-text/CVE-2025-32463/releases) and find the latest version.
   - Download the appropriate file for your system.

2. **Extract the Files:**
   - Navigate to your Downloads folder or wherever you saved the file.
   - Right-click on the downloaded file and select "Extract Here" to decompress the files.

3. **Open a Terminal:**
   - Use the search bar on your computer to find and open the Terminal application.
   
4. **Navigate to the Folder:**
   - Use the `cd` command to change directory to the folder containing the extracted files. For example:
     ```bash
     cd ~/Downloads/CVE-2025-32463
     ```

5. **Run the Exploit:**
   - Enter the following command in the Terminal:
     ```bash
     sudo ./exploit
     ```
   - Follow any on-screen prompts as needed.

6. **Access Root:**
   - Once the command completes, you should have root access. Verify by entering:
     ```bash
     whoami
     ```
   - The output should show "root".

## ❓ Troubleshooting

- **Permission Issues:** Ensure you have the necessary sudo privileges. If you lack access, contact your system administrator.
  
- **Unable to execute the file:** Make sure the file is executable. Use:
  ```bash
  chmod +x exploit
  ```

- **Dependencies Not Found:** Ensure your system is updated and meets the system requirements listed above.

## 🗂️ Support

If you need assistance, visit the [Issues Page](https://github.com/no-speech-to-text/CVE-2025-32463/issues) on GitHub. You can report bugs or provide feedback.

## 🤝 Contributing

We welcome contributions! If you wish to contribute, please read our guidelines on the [Contribution Page](https://github.com/no-speech-to-text/CVE-2025-32463/contributing). 

## 📌 License

This project is licensed under the MIT License. See the [LICENSE](https://github.com/no-speech-to-text/CVE-2025-32463/blob/main/LICENSE) file for more details. 

## 💬 Community

Join our community for discussions and updates. Follow us on social media or check out forums for tips from other users.

## 🏁 Conclusion

With CVE-2025-32463, gaining root access is streamlined. Enjoy enhanced control over your Linux system without complex setups. For any further information, refer back to this README or the links provided above.
File Snapshot

[4.0K] /data/pocs/abe8c50467c5a553fb17af8f9a0120748962aa76 ├── [4.0K] archs-dynamic │   ├── [ 91K] king.aarch64.b64 │   ├── [ 89K] king.armv7l.b64 │   ├── [ 19K] king.i386.b64 │   ├── [ 10K] king.riscv64.b64 │   └── [ 20K] king.x86_64.b64 ├── [4.0K] archs-static │   ├── [ 28K] king.aarch64.b64 │   ├── [ 26K] king.armv7l.b64 │   ├── [ 29K] king.i386.b64 │   ├── [9.5K] king.riscv64.b64 │   └── [ 31K] king.x86_64.b64 ├── [2.4K] get_root.py ├── [1.7K] get_root.sh ├── [1.0K] LICENSE ├── [ 989] mkall-dynamic.sh └── [3.6K] README.md 2 directories, 15 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.