{"uuid": "6dc910e8-ae03-424b-ba72-8add71131782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-32548", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1566", "content": "#exploit\n1. CVE-2023-5521:\nRoot takeover via signature spoofing in tiann/kernelsu\nhttps://huntr.com/bounties/d438eff7-4e24-45e0-bc75-d3a5b3ab2ea1\n\n2. CVE-2023-4632:\nLPE in Lenovo System\u00a0Updater\nhttps://enigma0x3.net/2023/10/26/cve-2023-4632-local-privilege-escalation-in-lenovo-system-updater\n\n3. CVE-2022-32548:\nDrayTek unauthenticated RCE in /cgi-bin/wlogin.cgi\nhttps://github.com/MosaedH/CVE-2022-32548-RCE-POC", "creation_timestamp": "2024-08-16T08:40:14.000000Z"}