At Pwn2Own Berlin 2025, we demonstrated a critical UAF vulnerability in Redis’s Lua interpreter that has existed for 15 years. This vulnerability exploits an UAF that resets 2 bits, enabling arbitrary code execution with a 100% success rate. In this presentation, we will detail how the UAF vulnerability was leveraged to gain arbitrary read capabilities, perform object faking, and ultimately achieve arbitrary code execution. Notably, the exploit successfully bypassed modern security mitigations such as ASLR, PointerGuard, and CET. This session will outline the precise steps and techniques used to craft a reliable exploit.