### [CVE-2012-4220](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4220) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call. ### POC #### Reference - http://www.kb.cert.org/vuls/id/702452 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/aerosol/stars - https://github.com/emtee40/root-zte-open - https://github.com/hiikezoe/diaggetroot - https://github.com/poliva/root-zte-open - https://github.com/tangsilian/android-vuln