Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32462 PoC — Sudo 安全漏洞

Source
Associated Vulnerability
Title:Sudo 安全漏洞 (CVE-2025-32462)
Description:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于允许列出的用户在非预期机器上执行命令。
Description
The vulnerability was found by Rich Mirch. More details on it here: https://cxsecurity.com/issue/WLB-2025070022
Readme
# CVE-2025-32462 - Sudo Host Bypass Exploit

## Original Discovery
This vulnerability was discovered by Rich Mirch.  
More details can be found at:  
https://cxsecurity.com/issue/WLB-2025070022

## About
This script is an exploit for CVE-2025-32462, allowing privilege escalation by bypassing sudo's host restrictions.  
It targets Linux systems with affected versions of sudo and requires that the `sudo -h` option is accepted with `NOPASSWD` rights.

## Notes
This implementation was written by J3rich0123 for educational and CTF purposes.  
Credit for discovery remains solely with Rich Mirch.

## Usage
Run the script to start a pseudo-root shell on a target host defined in `TARGET_HOST`.  
For a full interactive shell, type `bash` inside the prompt or run `vim` → `:!bash`.
File Snapshot

[4.0K] /data/pocs/e72a3400a0694f92b0777dc43fea274fc02f897f ├── [ 928] exploit.sh └── [ 783] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.