N-day confirmation

This repository contains curated proof-of-concept exploits and exploitation artifacts derived from real-world vulnerabilities.

All materials are published strictly for security research, technical analysis, and reproducibility purposes.

The focus is on memory corruption, kernel exploitation, and system-level vulnerability research.

Component CVE Description Affected Versions Release Date Author
libarchiveCVE-2025-5914 Ownership confusion in libarchive library 3.8.02026-01-11Byte Reaper
linux kernel (ebpf)CVE-2025-39913 UAF in kernel linux (psock-cork)6.12.382025-10-01Byte Reaper
linux kernel (writeback subsystem)CVE-2025-39866use-after-free and race condition in linux kernel6.12.162025-09-26Byte Reaper
Tenda routersCVE-2025-7795Buffer overflow vulnerability in Tenda routersFH451 1.0.0.92025-07-18Byte Reaper
mbedTLSCVE-2025-47917Use-After-Free in mbedTLS leading to remote code execution (RCE)3.6.42025-07-20Byte Reaper
Linux kernel pipe buffer handlingCVE-2022-084Dirty Pipe in Linux kernel (privilege escalation)5.16.112022-03-29Byte Reaper

External Research Submissions

Bytrep selectively reviews external research artifacts that align with the scope and technical depth of our work.

Submissions may include proof-of-concept exploits, technical analyses, or vulnerability research derived from real-world security issues.

All submissions are evaluated by our internal research team. Publication is at the sole discretion of Bytrep.

Contact

Research submissions can be sent to:

Contact@bytrep.com