Skip to content

AKQ_0D_PE is a lightweight and powerful Zero-day local privilege escalation exploit targeting a critical vulnerability in the Linux PipeFS subsystem.

Notifications You must be signed in to change notification settings

AnonKryptiQuz/AKQ-PipeFS-ZeroDay-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

AKQ_0D_PE: PipeFS SUID Struct Corruption Vector

CVE-2025-101 Exploit-DB Rooted Lang-Bash CVSS 10.0

AKQ_0D_PE is a lightweight and powerful Zero-day local privilege escalation exploit targeting a critical vulnerability in the Linux PipeFS subsystem. By abusing a misalignment in SUID struct allocation within pipe buffers, the tool achieves root access through a multi-stage chain including memory corruption, ROP injection, and namespace traversal.


Features

  • PipeFS Memory Corruption: Exploits misaligned pipe_buffer allocations to overwrite SUID-related structures.
  • KASLR Bypass: Leverages /proc/kallsyms leaks to calculate kernel base addresses dynamically.
  • ROP Injection Workflow: Automates construction and delivery of a ROP chain to redirect kernel execution flow.
  • Namespace Escalation: Traverses user namespaces, modifying capability bits to bypass container boundaries.
  • Interactive Shell: Spawns an interactive root shell with full UID 0 identity and custom command responses.
  • Detailed Logging: Provides color‑coded logs and environment fingerprinting for each exploit stage.

Prerequisites

  • Bash Shell (Linux, WSL, or macOS with Bash)
  • No additional tools or packages required

Installation

  1. Clone the repository:

    git clone https://github.com/AnonKryptiQuz/AKQ-PipeFS-ZeroDay-Exploit.git
    cd AKQ-PipeFS-ZeroDay-Exploit
  2. Make the script executable:

    chmod +x AKQ_0D_PE

Usage

  1. Run the exploit:

    ./AKQ_0D_PE

    or

    bash AKQ_0D_PE
  2. Observe exploit stages:

    • Phase 1: Leak kernel symbols
    • Phase 2: Calculate KASLR offset
    • Phase 3: Overwrite struct cred
    • Phase 4: Inject ROP chain
    • Phase 5: Escalate privileges via namespace traversal
  3. Post-exploitation:

    • An interactive shell with UID 0 is launched
    • Commands whoami, id, and uname display root context
    • Detailed logs and environment info printed

Disclaimer

  • Educational Purposes Only: AKQ_0D_PE is intended solely for demonstration and awareness purposes. This tool is not meant to be used for unauthorized access or malicious activity. Users are responsible for ensuring they comply with all relevant laws and organizational policies.

  • See CVE advisory: CVE-2025-101


Gotcha!!!

  • Foolin’ with the Skiddies: While this may look like a real exploit, it’s all smoke and mirrors. There’s no real vulnerability being exploited here everything from the memory leaks to the root shell is just some Bash magic, delays, and alias hijinks. If you fell for it, maybe it’s time to rethink your threat model! This script is pure troll, crafted for pranks and fun. No actual systems were compromised in the making of this joke.

💀 Trolled by a zero-day with zero effort.

Gotcha Meme


Author

Created by: AnonKryptiQuz

Releases

No releases published

Packages

No packages published

Languages