upvote
The specific exploit payload for the POC relies on a su binary. The vuln is ambivalent and other non-su paths will exist.
reply