## https://sploitus.com/exploit?id=7EB28959-F182-5A5A-A5F5-0DBF2B6288A3
# Exploits for CVE-2022-43293
<p align="center">
<img src="POC_AFW.gif" title="Arbitrary File Write\Overwrite POC">
</p>
<hr>
<p align="center">
<img src="POC_WDOS.gif" title="Windows Denial of Service POC">
</p>
To get a persistent Windows Denial of Service (as shown in the POC above), simply run <code>Exploit.bat</code> and enter <code>%windir%\system32\cng.sys</code> when you're asked which file you want to overwrite.
<hr>
<a href="https://lucabarile.github.io/Blog/CVE-2022-43293/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Arbitrary File Write\Overwrite Vulnerability</b> report.<br>
<a href="https://lucabarile.github.io/Blog/CVE-2022-43293/index.html#par9" target="_blank" rel="noopener noreferrer">Here</a> you can understand how to use an <b>Arbitrary File Write\Overwrite</b> primitive <b>to</b> achieve a <b>Windows Denial of Service</b>.<br>
<a href="https://www.buymeacoffee.com/LucaBarile" target="_blank" rel="noopener noreferrer">Here</a> you can buy me a unicorn 🦄
<hr>
<h5 align="right">Share the Knowledge!</h5>