iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201

iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201

JGoyd

CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalation (CVE-2025-31201), and allowed token theft until patched in iOS 18.4.1 (Apr 16, 2025).

196 Stars
29 Forks
196 Watchers
100 SrcLog Score
Cost to Build
$6.1K
Market Value
$21.4K

Growth over time

3 data points  ·  2026-04-11 → 2026-04-26
Stars Forks Watchers
💬

How do you feel about this project?

Ask AI about iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201

Question copied to clipboard

What is the JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201 GitHub project? Description: "CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalation (CVE-2025-31201), and allowed token theft until patched in iOS 18.4.1 (Apr 16, 2025).". Explain what it does, its main use cases, key features, and who would benefit from using it.

Question is copied to clipboard — paste it after the AI opens.

How to clone iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201

Clone via HTTPS

git clone https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201.git

Clone via SSH

[email protected]:JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201.git

Download ZIP

Download master.zip

Found an issue?

Report bugs or request features on the iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201 issue tracker:

Open GitHub Issues