nomisec
WORKING POC
126 stars
by kangtastic · local
https://github.com/kangtastic/cve-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a kernel memory R/W privilege escalation vulnerability affecting Google Pixel 2 and Pixel 2 XL devices. The exploit achieves temporary root access by leveraging arbitrary kernel memory read/write capabilities and includes a debug console for further exploration.
Classification
Working Poc 100%
Target:
Linux kernel 4.4.177-g83bee1dc48e8 on Google Pixel 2/Pixel 2 XL
No auth needed
Prerequisites:
Android NDK r19 or higher for compilation · Device running vulnerable kernel version
nomisec
WORKING POC
76 stars
by timwr · local
https://github.com/timwr/CVE-2019-2215
This repository contains a functional proof-of-concept exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel's Binder driver. The exploit leverages race conditions and memory corruption to achieve arbitrary kernel read/write access, ultimately leading to local privilege escalation.
Classification
Working Poc 95%
Target:
Linux kernel (versions affected by CVE-2019-2215)
No auth needed
Prerequisites:
Access to a vulnerable Linux kernel · Ability to execute code on the target system
nomisec
WRITEUP
65 stars
by sharif-dev · local
https://github.com/sharif-dev/AndroidKernelVulnerability
This repository provides a detailed technical analysis of CVE-2019-2215, a use-after-free vulnerability in the Android kernel's binder.c. It includes a walkthrough of the vulnerability, static and dynamic analysis, and references to a PoC for exploitation.
Classification
Writeup 95%
Target:
Android Kernel (binder.c)
No auth needed
Prerequisites:
Android device with vulnerable kernel · Local application installation
nomisec
WORKING POC
40 stars
by 0xbinder · local
https://github.com/0xbinder/android-kernel-exploitation-lab
This repository contains functional exploit code for CVE-2019-2215, a use-after-free vulnerability in the Android binder driver. It includes detailed technical documentation, fuzzing setups, and a working PoC exploit demonstrating privilege escalation.
Classification
Working Poc 95%
Target:
Android kernel (8.x, 9.0, early 10) with binder driver
No auth needed
Prerequisites:
Access to vulnerable Android device/emulator · Kernel with binder driver · Epoll syscall access
nomisec
WORKING POC
39 stars
by DimitriFourny · local
https://github.com/DimitriFourny/cve-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Android Binder driver. The exploit leverages the UAF to achieve local privilege escalation (LPE) by manipulating kernel structures to bypass KASLR, disable SELinux, and escalate privileges to root.
Classification
Working Poc 100%
Target:
Android Binder driver (Linux kernel)
No auth needed
Prerequisites:
Access to a vulnerable Android device with the Binder driver · Ability to compile and execute native code on the target device
nomisec
WORKING POC
24 stars
by LIznzn · local
https://github.com/LIznzn/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Android Binder IPC subsystem. The exploit achieves temporary root privileges on Sony Bravia TV devices running Android 8 with kernel version 4.9.51 by manipulating kernel memory structures.
Classification
Working Poc 95%
Target:
Sony Bravia TV (Android 8, kernel 4.9.51)
No auth needed
Prerequisites:
Physical or ADB access to the target device · Android NDK for compilation
nomisec
WORKING POC
13 stars
by stevejubx · local
https://github.com/stevejubx/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Android Binder driver. The exploit achieves temporary root access on Pixel 2 and Pixel 2 XL devices running specific kernel versions by leveraging arbitrary kernel memory read/write to bypass SELinux and escalate privileges.
Classification
Working Poc 100%
Target:
Android Kernel (4.4.177-g83bee1dc48e8 on Pixel 2/Pixel 2 XL)
No auth needed
Prerequisites:
Android device with vulnerable kernel (Pixel 2/Pixel 2 XL, QP1A.190711.020) · Local access to the device
nomisec
WORKING POC
12 stars
by c3r34lk1ll3r · local
https://github.com/c3r34lk1ll3r/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Android Binder driver. The PoC demonstrates privilege escalation by manipulating kernel memory structures to bypass address space limits.
Classification
Working Poc 95%
Target:
Android Binder driver (Linux Kernel)
No auth needed
Prerequisites:
Access to an Android device with a vulnerable kernel · Ability to execute code on the target device
nomisec
WORKING POC
10 stars
by R0rt1z2 · local
https://github.com/R0rt1z2/huawei-unlock
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Binder driver of Android. The exploit leverages the libsepol library to manipulate SELinux policies and achieve local privilege escalation on affected Huawei devices.
Classification
Working Poc 90%
Target:
Android (Huawei devices)
No auth needed
Prerequisites:
Physical access or local shell on the target device · Android device with vulnerable Binder driver
nomisec
STUB
6 stars
by qre0ct · poc
https://github.com/qre0ct/android-kernel-exploitation-ashfaq-CVE-2019-2215
The repository contains only a minimal README with no exploit code or technical details. It references a Docker image from a workshop but provides no functional PoC or analysis.
Target:
Android Kernel (CVE-2019-2215)
No auth needed
Prerequisites:
Docker image from workshop
nomisec
WORKING POC
5 stars
by willboka · local
https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite
This repository contains a functional exploit for CVE-2019-2215, targeting the Huawei P20 Lite running Android 8.0.0. The exploit leverages the 'bad binder' vulnerability to achieve local privilege escalation by manipulating kernel memory structures.
Classification
Working Poc 95%
Target:
Huawei P20 Lite (Android 8.0.0, Kernel 4.4.23)
No auth needed
Prerequisites:
Physical or ADB access to the target device · Android NDK for compilation
nomisec
WORKING POC
4 stars
by mutur4 · local
https://github.com/mutur4/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free (UAF) vulnerability in the Android Binder driver. The exploit leverages arbitrary address read (AAR) and write (AAW) primitives to leak kernel addresses and overwrite `addr_limit`, ultimately achieving local privilege escalation (LPE).
Classification
Working Poc 95%
Target:
Android Binder driver (Linux kernel)
No auth needed
Prerequisites:
Access to a vulnerable Android device or emulator · Kernel with the specific Binder driver vulnerability
nomisec
WORKING POC
3 stars
by Enceka · poc
https://github.com/Enceka/cve-2019-2215-3.18
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel (3.18) affecting Android devices. The PoC includes native code (poc98.c) and an Android app to achieve local privilege escalation (LPE) by exploiting the Binder driver.
Classification
Working Poc 95%
Target:
Linux kernel 3.18 (Android Binder driver)
No auth needed
Prerequisites:
Android device with vulnerable kernel (3.18) · Local access to the device
nomisec
WORKING POC
3 stars
by llccd · poc
https://github.com/llccd/TempRoot-Huawei
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel's binder driver, specifically targeting Huawei devices with hardened kernels. The exploit includes code to bypass Huawei's security mechanisms (e.g., SELinux, hypervisor-protected credentials) and achieve temporary root access.
Classification
Working Poc 95%
Target:
Linux kernel (Huawei hardened kernel, specifically tested on P20 Pro CLT-AL00 with firmware build fingerprint 'HUAWEI/CLT-AL00/HWCLT:8.1.0/HUAWEICLT-AL00/176(C00)')
No auth needed
Prerequisites:
Access to a vulnerable Huawei device with the specific kernel version · Compilation environment for the exploit code
nomisec
WORKING POC
3 stars
by Byte-Master-101 · local
https://github.com/Byte-Master-101/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Android Binder driver. The exploit achieves local privilege escalation (LPE) by manipulating kernel structures to gain arbitrary read-write permissions, disable SELinux, and escalate to root.
Classification
Working Poc 100%
Target:
Android Kernel (Binder driver)
No auth needed
Prerequisites:
Android device with vulnerable kernel · Local access to the device
nomisec
WORKING POC
3 stars
by mufidmb38 · local
https://github.com/mufidmb38/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel's Binder driver. The exploit achieves arbitrary kernel read/write access and privilege escalation on Android devices running kernel 3.18.
Classification
Working Poc 95%
Target:
Linux kernel 3.18 (Android)
No auth needed
Prerequisites:
Android device with kernel 3.18 · ADB access to push and execute binaries
nomisec
WORKING POC
2 stars
by elbiazo · local
https://github.com/elbiazo/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Android Binder driver. The Makefile compiles an exploit binary for Android, and the README references a detailed writeup for further technical context.
Classification
Working Poc 90%
Target:
Android Binder driver (Linux kernel versions before 4.14.114, 4.19.38, 5.1.11)
No auth needed
Prerequisites:
Android device with vulnerable kernel · ADB access for deployment
nomisec
WORKING POC
2 stars
by CrackerCat · poc
https://github.com/CrackerCat/Rootsmart-v2.0
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Binder driver of Android. The exploit includes a C-based PoC and an Android app (2048-Game) modified to deliver the payload, demonstrating privilege escalation to root.
Classification
Working Poc 90%
Target:
Android (Binder driver, kernel versions before 2019-10-01)
No auth needed
Prerequisites:
Android device with vulnerable kernel · Ability to run arbitrary code on the device
nomisec
WORKING POC
2 stars
by mouseos · local
https://github.com/mouseos/cve-2019-2215_SH-M08
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel's binder driver, allowing local privilege escalation to root on vulnerable Android devices. The PoC includes detailed instructions for porting to other devices and demonstrates kernel memory manipulation to achieve root access.
Classification
Working Poc 100%
Target:
Linux kernel (Android devices with security patches before October 2019)
No auth needed
Prerequisites:
Physical or ADB access to the target device · Device with security patches before October 2019
nomisec
WORKING POC
2 stars
by raystyle · local
https://github.com/raystyle/CVE-2019-2215
This repository contains a functional proof-of-concept exploit for CVE-2019-2215, a use-after-free vulnerability in the Android Binder driver. The exploit demonstrates arbitrary kernel read/write access, leveraging a race condition in the binder_thread struct's waitqueue handling.
Classification
Working Poc 100%
Target:
Android kernel (msm branch, versions before the patch)
No auth needed
Prerequisites:
Access to a vulnerable Android device (e.g., Pixel 2 with unpatched kernel) · Ability to execute untrusted code on the device
nomisec
WORKING POC
1 stars
by i-redbyte · local
https://github.com/i-redbyte/android-badbinder-demo
This repository contains a functional exploit PoC for CVE-2019-2215, a Use-After-Free (UAF) vulnerability in the Android Binder IPC subsystem. The exploit includes detailed technical analysis, a Kotlin-based Android UI, and native C code to demonstrate the UAF, leak task_struct addresses, and attempt privilege escalation.
Classification
Working Poc 95%
Target:
Android Kernel (Binder IPC subsystem), versions affected by CVE-2019-2215
No auth needed
Prerequisites:
Android device or emulator with vulnerable kernel (pre-patch for CVE-2019-2215) · Access to /dev/binder · Ability to run native code
nomisec
WORKING POC
1 stars
by ATorNinja · poc
https://github.com/ATorNinja/CVE-2019-2215
This repository contains a functional proof-of-concept exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel's binder driver. The PoC demonstrates the vulnerability by triggering the freeing of a binder_thread structure and attempting to exploit the use-after-free condition via epoll operations.
Classification
Working Poc 90%
Target:
Linux kernel (specifically versions 3.4.0 and 3.18.x)
No auth needed
Prerequisites:
Access to a vulnerable Linux kernel version · Ability to execute code on the target system
nomisec
WORKING POC
1 stars
by nicchongwb · local
https://github.com/nicchongwb/Rootsmart-v2.0
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Binder driver of Android. The exploit code is present in the `cve-2019-2215.c` file, and the repository includes additional components like a dropper script and a modified 2048 game app, likely used for delivery or persistence.
Classification
Working Poc 90%
Target:
Android (Binder driver)
No auth needed
Prerequisites:
Android device with vulnerable Binder driver · Local access to the device
nomisec
WORKING POC
by raymontag · local
https://github.com/raymontag/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel's binder driver. The exploit leverages epoll and binder interactions to achieve local privilege escalation (LPE) by manipulating kernel memory structures.
Classification
Working Poc 95%
Target:
Linux kernel (Android binder driver)
No auth needed
Prerequisites:
Android device with vulnerable kernel · Local access to the device
gitlab
WORKING POC
by ntkernel · local
https://gitlab.com/ntkernel/CVE-2019-2215
This repository contains a functional proof-of-concept exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel's Binder driver. The exploit leverages the vulnerability to gain arbitrary kernel read/write access, demonstrating privilege escalation on affected Android devices.
Classification
Working Poc 100%
Target:
Linux kernel (Binder driver) on Android devices
No auth needed
Prerequisites:
Android device with vulnerable kernel · Access to the Binder driver
nomisec
WORKING POC
by XiaozaYa · poc
https://github.com/XiaozaYa/CVE-2019-2215
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Android Binder driver. The exploit leverages epoll and pipe operations to achieve arbitrary read/write primitives, ultimately disabling SELinux and escalating privileges to root.
Classification
Working Poc 95%
Target:
Android (Kernel 4.14.175, API-29)
No auth needed
Prerequisites:
Android emulator with specific kernel version (4.14.175) · Disabled kernel hardening features (CONFIG_SLAB_FREELIST_RANDOM, CONFIG_SLAB_FREELIST_HARDENED)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalandroid
https://www.exploit-db.com/exploits/48129
This Metasploit module exploits CVE-2019-2215, a use-after-free vulnerability in the Android Binder driver, to achieve local privilege escalation on vulnerable Android devices. It uploads and executes a precompiled exploit binary along with a payload to gain a Meterpreter session.
Classification
Working Poc 100%
Target:
Android (specific versions affected by CVE-2019-2215)
No auth needed
Prerequisites:
Access to a vulnerable Android device · Ability to execute arbitrary code on the target
metasploit
WORKING POC
EXCELLENT
by Jann Horn, Maddie Stone, grant-h, timwr · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/android/local/binder_uaf.rb
This Metasploit module exploits CVE-2019-2215, a use-after-free vulnerability in the Android Binder kernel driver, to achieve local privilege escalation. It uploads and executes a precompiled exploit binary to overwrite kernel memory structures, enabling arbitrary read/write access to kernel memory.
Classification
Working Poc 100%
Target:
Android kernel (versions affected by CVE-2019-2215)
No auth needed
Prerequisites:
Local access to an Android device · A vulnerable kernel version · A compatible payload (e.g., meterpreter)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textlocalandroid
https://www.exploit-db.com/exploits/47463
This exploit demonstrates a use-after-free vulnerability in the Android Binder driver (CVE-2019-2215), leading to a kernel crash or privilege escalation. The PoC triggers the UAF by manipulating epoll and binder thread structures, confirmed on Pixel 2 devices.
Classification
Working Poc 100%
Target:
Android kernel (msm-4.4, msm-4.9, msm-4.14) on various devices including Pixel 2, Huawei P20, Xiaomi Redmi 5A, etc.
No auth needed
Prerequisites:
Access to a vulnerable Android device · Ability to execute untrusted code (e.g., via a malicious app or chained with a renderer exploit)
vulncheck_xdb
WORKING POC
local
https://github.com/enceka/cve-2019-2215-3.18
This repository contains a functional exploit for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel (3.18) affecting Android devices. The PoC includes native code (poc98.c) and an Android app to achieve local privilege escalation (LPE) by exploiting the Binder driver.
Classification
Working Poc 95%
Target:
Linux kernel 3.18 (Android Binder driver)
No auth needed
Prerequisites:
Android device with vulnerable kernel (3.18) · Local access to the device
vulncheck_xdb
WORKING POC
local
https://github.com/CrackerCat/cve2019-2215-3.18
This repository contains a functional exploit PoC for CVE-2019-2215, a use-after-free vulnerability in the Linux kernel's binder driver. The exploit leverages the vulnerability to achieve arbitrary kernel read/write access and escalate privileges on Android devices running kernel version 3.18.
Classification
Working Poc 95%
Target:
Linux kernel 3.18 (Android)
No auth needed
Prerequisites:
Android device with kernel 3.18 · Access to the binder driver