vendor:
                    
                by:
                    Alexys
                3.1
                        CVSS
                    MEDIUM
                    Code Injection
                    94
                        CWE
                    Product Name: 
                    Affected Version From:  
                    Affected Version To:  
                    Patch Exists: NO
                    Related CWE: 
                    CPE:  
                    Platforms Tested:  Linux
                    2021
                    Linux-x64 – XOR Encrypted Shellcode for execve() with /bin//sh Argument
The exploit involves creating a new process in Linux x86_64 by utilizing the execve() system call with an argument of /bin//sh. The shellcode is XOR encrypted, with the encrypted value being QWORD size (/bin - //sh). The assembly code uses XOR operations to set up the arguments for execve() and then executes the system call. The C code snippet demonstrates the execution of the shellcode from the stack.
Mitigation:
					To mitigate this vulnerability, ensure that all input is properly sanitized and validated to prevent unauthorized code execution.