The final post in this series explores the exploitation of a use-after-free vulnerability, CVE-2020-15972, in Chrome's WebAudio component, allowing for arbitrary code execution in the Android kernel. The author details the process of chaining this vulnerability with others to escalate privileges from a constrained renderer process to full Android app privileges. The post delves into the technical intricacies of manipulating audio graphs and exploiting race conditions to achieve use-after-free, enabling the execution of malicious code. It highlights the challenges of obtaining an info leak and the subsequent steps to execute remote code by leveraging a fake vtable. The author emphasizes the effectiveness of Chrome's quick vulnerability patching and sandboxing, which mitigate the impact of such exploits, but notes that the once-per-boot ASLR on Android limits the sandbox's robustness against local privilege escalations.