$78 GRAYBYTE WORDPRESS FILE MANAGER $40

SERVER : vnpttt-amd7f72-h1.vietnix.vn #1 SMP Fri May 24 12:42:50 UTC 2024
SERVER IP : 103.200.23.149 | ADMIN IP 216.73.216.22
OPTIONS : CRL = ON | WGT = ON | SDO = OFF | PKEX = OFF
DEACTIVATED : NONE

/home/bqrcodec/contact.fpt.auto/.t/CVE-2025-0401/

HOME
Current File : /home/bqrcodec/contact.fpt.auto/.t/CVE-2025-0401//README.md
# CVE-2025-0401 - Local Privilege Escalation via SUID Binary Abuse

## Summary

CVE-2025-0401 is a local privilege escalation vulnerability discovered in systems where the `/usr/bin/passwd` binary is misconfigured, allowing unintended root-level access when combined with specific syscall sequences. This exploit demonstrates how attackers can leverage SUID misconfigurations to simulate root shell access.

> ⚠️ This PoC is intended for educational and authorized testing environments only.

---

## Exploit Details

The vulnerability is triggered through direct syscalls involving:
- `setuid(0)`
- `setgid(0)`
- Execution of `/bin/sh`

### Syscalls used:
- `write` (1)
- `setuid` (105)
- `setgid` (106)
- `execve` (59)
- `exit` (60)

---

## Usage

```bash
git clone https://github.com/CyberSecurityUP/CVE-2025-0401.git
cd CVE-2025-0401
gcc -z execstack -fno-stack-protector exploit.c -o exploit
chmod +x exploit
./exploit
```

"Not everything said with a smile is true... especially on April 1st."

Current_dir [ WRITEABLE ] Document_root [ WRITEABLE ]


[ Back ]
NAME
SIZE
LAST TOUCH
USER
CAN-I?
FUNCTIONS
..
--
18 Mar 2026 5.50 AM
bqrcodec / bqrcodec
0775
.git
--
15 Apr 2025 9.48 AM
bqrcodec / bqrcodec
0775
wp-site
--
18 Mar 2026 5.50 AM
bqrcodec / bqrcodec
0755
README.md
0.981 KB
15 Apr 2025 9.48 AM
bqrcodec / bqrcodec
0664
exploit
18.031 KB
15 Apr 2025 9.48 AM
bqrcodec / bqrcodec
0775
exploit.c
2.055 KB
15 Apr 2025 9.48 AM
bqrcodec / bqrcodec
0664
prank.asm
1.245 KB
15 Apr 2025 9.48 AM
bqrcodec / bqrcodec
0664
shellcode
1.446 KB
15 Apr 2025 9.48 AM
bqrcodec / bqrcodec
0664

GRAYBYTE WORDPRESS FILE MANAGER @ 2026 CONTACT ME
Static GIF