Share
## https://sploitus.com/exploit?id=F66047B2-BD06-53CF-B4D5-AA0893DF64F8
This is a simple example payload for CVE-2022-21894 that demonstrates how an attacker could map a second stage payload in order to be able to call EFI services.  
A writeup of this vulnerability can be viewed here: https://github.com/Wack0/CVE-2022-21894.  
The code in this repository extends the PoC (poc_amd64_19041) of the repository mentioned above.