Share
## https://sploitus.com/exploit?id=9FF3A51F-1367-5639-8E87-E1DC8BEFBCD4
# CVE-2025-32463 โ€” sudo -R Privilege Escalation Exploit (illdeed Variant)

This is a refactored proof-of-concept (PoC) exploit for [CVE-2025-32463](https://nvd.nist.gov/vuln/detail/CVE-2025-32463), a critical vulnerability in `sudo` versions 1.9.14 through 1.9.17 that allows **local privilege escalation to root** via `sudo -R` and a fake NSS module.

> โš ๏ธ This version creates a payload named `illdeed` for tracking and forensic testing.

## ๐Ÿ’ฅ How It Works

- Creates a fake chroot directory with a custom `nsswitch.conf`
- Compiles a malicious `libnss_illdeed.so.2` shared object
- Executes arbitrary root commands using `sudo -R <fake_root>`
- Cleans up after execution unless `--no-clean` is passed

## โœ… Requirements

- Linux system with `sudo` 1.9.14 โ†’ 1.9.17
- `gcc` installed
- User with local shell access and ability to run `sudo -R` (no password required)

## ๐Ÿš€ Usage

```bash
# Get an interactive root shell
./sudo-illdeed.sh

# Run a custom root command
./sudo-illdeed.sh "id && whoami && touch /root/illdeed.txt"

# Keep generated files for analysis
./sudo-illdeed.sh --no-clean
```

## ๐Ÿ” Disclaimer

This code is provided for educational and authorized security testing purposes only.
Do not use against systems you do not own or have explicit permission to test.

## ๐Ÿ“š Credits

Original PoC: Rich Mirch (Stratascale Cyber Research Unit)

Refactored variant: illdeed