Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-7920 PoC — Android 任意代码执行漏洞

Source
Associated Vulnerability
Title:Android 任意代码执行漏洞 (CVE-2014-7920)
Description:Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。 Android 2.2版本至5.0.x版本中存在安全漏洞。攻击者可利用该漏洞以mediaserver权限执行任意代码。
Description
cve-2014-7920-7921 exploit update
Readme
# cve-2014-7920-7921
Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1

The symbols in this exploit are for Android 4.3, for can be adapted to any version up to Android 5.1
File Snapshot

[4.0K] /data/pocs/c444de658a43b42a94219fb6e24104ebdf012c05 ├── [1.1K] Android.mk ├── [ 176] build.sh ├── [2.0K] defs.h ├── [1.8K] gadgets.h ├── [ 15K] LICENSE ├── [7.2K] main.cpp ├── [1.3K] memory_map.cpp ├── [1.7K] memory_map.h ├── [4.7K] primitives.cpp ├── [3.6K] primitives.h ├── [ 217] README.md ├── [2.0K] write32.cpp └── [1.3K] write32.h 0 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.