There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how to use these code bases please check my blog.# cve-2022-27666-exploits
There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how to use these code bases please check my blog [here](https://albocoder.github.io/exploit/2023/03/13/KernelFileExploit.html).
[4.0K] /data/pocs/d8dabd5d3b894428d8398c9a8aa4c9277c0700f0
├── [ 233] README.md
├── [4.0K] struct file method
│ ├── [2.1K] fuse_evil.c
│ ├── [ 889] fuse_evil.h
│ └── [ 79K] poc.c
└── [4.0K] struct vm_area_struct method
├── [2.1K] fuse_evil.c
├── [ 889] fuse_evil.h
└── [ 73K] poc.c
2 directories, 7 files