crazymind90

IOGPUFamily bitmap_mask underflow → kernel heap OOB write. First public PoC. Original discovery by Wang Yu of Cyberserval.

19
5
69% credibility
Found Mar 20, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Objective-C
AI Summary

A proof-of-concept that triggers a kernel panic on vulnerable older iOS devices via Apple's graphics component.

How It Works

1
🔍 Discover the security tip

You hear about a hidden flaw in older iPhones that can make them restart unexpectedly.

2
📥 Grab the guide

You download the simple instructions and code snippet from the shared page.

3
💻 Start a basic app

On your Mac, you create a plain app that can run on your real iPhone.

4
Add the special code

You copy and paste the provided code into your app to test the flaw.

5
🚀 Launch on your phone

You install the app on your iPhone and tap the button to activate the test.

💥 See the restart happen

Your phone quickly reboots, proving the flaw works just like described for your learning.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 19 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is CVE_2025_24257----NOT-MINE?

This Objective-C project delivers the first public PoC for CVE-2025-24257, an original discovery by Wang Yu of Cyberserval—not mine, as the repo stresses. It exploits a bitmap_mask underflow in IOGPUFamily, enabling kernel heap OOB reads and writes via simple IOKit calls from an app. Developers get a one-function trigger that panics vulnerable iOS devices in milliseconds, perfect for verifying the 2025 heap flaw.

Why is it gaining traction?

As the first PoC for this kernel OOB write in IOGPUFamily, it stands out with zero-entitlement access from sandboxed apps and a three-call trigger: open, create resource, close. No complex setup—just link IOKit in Xcode, invoke the entry point on a real device, and watch the panic. Its clear docs on affected versions like iOS 18.3 hook security folks chasing quick repros over vague advisories.

Who should use this?

iOS kernel researchers reproducing CVE-2025-24257 for patch validation on 18.3 devices. Pentesters assessing Apple GPU driver risks in enterprise fleets. Defensive analysts at firms like Cyberserval studying bitmap_mask underflows without building from scratch.

Verdict

Grab it if you're deep in iOS kernel security—solid docs and dead-simple usage outweigh the low 0.699999988079071% credibility score and 19 stars. Skip for production; it's a niche PoC, not a library, but shines for targeted testing.

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.