Share
## https://sploitus.com/exploit?id=065FA14F-8469-537A-BCC7-AA641B59B198
# CVE-2025-2783
Simulated PoC for CVE-2025-2783 β€” a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.

This project simulates a safe and educational proof-of-concept for [CVE-2025-2783](https://nvd.nist.gov/vuln/detail/CVE-2025-2783), a vulnerability in Google Chrome’s Mojo IPC framework that allowed sandbox escape and local code execution on Windows systems.

> ⚠️ This is **not a real exploit**. This is a **simulated demonstration** intended for educational, red teaming, and detection engineering training purposes only.

---

## πŸš€ Features

- πŸ•΅οΈ Sandbox detection (via `ctypes`)
- 🐍 Mojo-style IPC using Python `multiprocessing.connection`
- 🌐 Phishing payload delivery via local HTTP server
- 🧠 Memory fuzz simulation
- πŸ”’ Simulated escape only works with crafted handle
- πŸͺ΅ Full activity logs to `incident.log`

---

## πŸ§ͺ Lab Requirements

- OS: Windows 10 (Preferably in a VM)
- Python: 3.8+
- Git (optional)
- Visual Studio Code (recommended)
- Chrome v134.0.6998.142 (for context; not exploited here)

---

## πŸ“ Folder Structure

CVE-2025-2783/
β”œβ”€β”€ advanced_cve_2025_2783.py      # Main standalone PoC script
β”œβ”€β”€ incident.log                   # Logs actions and simulated activity
β”œβ”€β”€ Screenshot_1.png               # (Optional) VS Code split-terminal output
β”œβ”€β”€ Screenshot_2.png               # (Optional) Phishing server directory view
β”œβ”€β”€ README.md                      # Documentation file (this one)


---

## πŸ”§ How to Use

1. Clone or download the repository:

cd CVE-2025-2783-simulation
python advanced_cve_2025_2783.py

Run the script:
python advanced_cve_2025_2783.py

When prompted:

1 β†’ Starts phishing server

2 β†’ Runs exploit client