**Exploit Title : Microsoft Graphics Component Windows 11 Pro (Build 26100+) - Local Elevation of Privileges
**Author:** nu11secur1ty
**Date:** 07/11/2025
---
## Overview
This repository contains a PowerShell script to **validate whether a
Windows 11 system is vulnerable to CVE-2025-49744**—a critical local
privilege escalation vulnerability involving the `gdi32.dll` and
`win32kfull.sys` system components.
The script performs the following checks:
- Windows build number validation
- Installed hotfixes, focusing on July 2025 patches including **KB5039302**
- Binary timestamp verification of critical system files
- Safe, non-destructive GDI32 API interaction test
---
## PoC Validator
[href](https://raw.githubusercontent.com/nu11secur1ty/CVE-mitre/refs/heads/main/2025/CVE-2025-49744/Validate-CVE-2025-49744-PoC.ps1)
## Usage
1. Open **PowerShell as Administrator**.
2. Download or clone this repository to your system.
3. Run the script:
```powershell
.\Validate-CVE-2025-49744-PoC.ps1
## Output
[CVE-2025-49744 PoC Validator] by nu11secur1ty
[*] Windows Build Number: 26100
[*] July 2025 Hotfixes installed:
-> KB5056579 (7/9/2025)
-> KB5039302 (7/9/2025)
[*] Checking critical system binary timestamps:
gdi32.dll: Version 10.0.26100.4484, Last Write Time: 7/9/2025
[✓] Binary appears patched.
[*] Running safe GDI32 API interaction test...
[+] GDI32 CreateSolidBrush succeeded (handle: 12345)
[✓] SYSTEM STATUS: Patched against CVE-2025-49744.
```
## Important Notes
- This script does not exploit or alter the system. It only performs
validation and safe API calls.
- Keep your system regularly updated with official Microsoft patches.
- Use this tool for awareness and compliance in your security assessments.
## License
MIT License (or specify your preferred license)
## References
- [CVE-2025-49744](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49744)
on MITRE
- Microsoft Security Bulletin - July 2025
- PowerShell documentation
## Video demo:
[href](https://www.youtube.com/watch?v=SR2pWoncfw4)
## Buy the real exploit:
[href](https://satoshidisk.com/pay/COq10D)
## Disclaimer
Use this tool responsibly and only on systems you own or have explicit
permission to test.
--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstorm.news/
https://cve.mitre.org/index.html
https://cxsecurity.com/ and https://www.exploit-db.com/
0day Exploit DataBase https://0day.today/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty