It uses its very own exploit. Judging from that output, I think it can be tweaked to work. The "[+] Hooked mask_requests_validate()" means it has already overwritten part of the running kernel. After that, it tries to call something to get the kernel to execute the overwritten code.
It looks like we may have to try overwriting a different spot on yours, and then getting it to run that bit of code instead. If you can get the source for your kernel, it would probably speed up the process a bit.
It looks like we may have to try overwriting a different spot on yours, and then getting it to run that bit of code instead. If you can get the source for your kernel, it would probably speed up the process a bit.