The vulnerability was found by Rich Mirch. More details on it here: https://cxsecurity.com/issue/WLB-2025070022# CVE-2025-32462 - Sudo Host Bypass Exploit
## Original Discovery
This vulnerability was discovered by Rich Mirch.
More details can be found at:
https://cxsecurity.com/issue/WLB-2025070022
## About
This script is an exploit for CVE-2025-32462, allowing privilege escalation by bypassing sudo's host restrictions.
It targets Linux systems with affected versions of sudo and requires that the `sudo -h` option is accepted with `NOPASSWD` rights.
## Notes
This implementation was written by J3rich0123 for educational and CTF purposes.
Credit for discovery remains solely with Rich Mirch.
## Usage
Run the script to start a pseudo-root shell on a target host defined in `TARGET_HOST`.
For a full interactive shell, type `bash` inside the prompt or run `vim` → `:!bash`.
[4.0K] /data/pocs/e72a3400a0694f92b0777dc43fea274fc02f897f
├── [ 928] exploit.sh
└── [ 783] README.md
0 directories, 2 files