# CVE-2021-21086 Exploit
This exploit allows to execute a shellcode in the context of the rendering process of Adobe Acrobat Reader DC 2020.013.20074 and earlier versions on Windows 10.
Note: the shellcode used in this example pops a calc. For it to work you must disable Adobe Reader's sandbox or you can replace it with other shellcode.
You can see it in action (with the sandbox disabled) [here](

For more info on how it works, read our [blogpost](

## How to use:
1. Generate exploit charstring: `python3 .\ --output charstring`.
2. Embed charstring into a pdf file: `python3 .\ --filename .\charstring --out exploit.pdf`.
3. Open pdf file with Adobe Reader DC.