# CVE-2025-32463 Sudo EoP Exploit PoC (Rust)
## Using Prebuild Binary
### 1. Clone the repository and run the binary in the target machine.
```bash
git clone https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC.git
cd CVE-2025-32463-Chwoot-POC
./exploit
```
## Build From Source
### 1. Clone the repository (if not done already)
```bash
git clone https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC.git
cd CVE-2025-32463-Chwoot-POC
````
### 2. Build the Rust binary in release mode
```bash
cargo build --release
```
The compiled binary will be located at:
```bash
./target/release/CVE-2025-32463-Chwoot-POC
```
---
## Usage
Run the exploit binary with optional command arguments:
* To spawn an interactive root shell:
```bash
sudo ./target/release/CVE-2025-32463-Chwoot-POC
```
* To run a specific command as root (for example, `id`):
```bash
sudo ./target/release/CVE-2025-32463-Chwoot-POC "id"
```
---
## Docker Usage
Alternatively, use the provided Docker container for an isolated vulnerable environment with all dependencies installed.
1. Build the Docker image
```bash
docker build -t sudo-chwoot .
```
2. Run the container interactively (if it didnt work , then try using the image id instead of sudo-chwoot. You can get thata using `sudo docker images`)
```bash
docker run --rm -it --privileged sudo-chwoot
```
3. Inside the container, run the exploit
```bash
cd /home/pwn/CVE-2025-32463-Rust-POC
./target/release/CVE-2025-32463-Chwoot-POC
```
[4.0K] /data/pocs/f30da8855480a95f265615972570afeb17cd4a5f
├── [7.6K] Cargo.lock
├── [ 116] Cargo.toml
├── [ 810] Dockerfile
├── [533K] exploit
├── [1.5K] README.md
└── [4.0K] src
└── [1.7K] main.rs
1 directory, 6 files