## https://sploitus.com/exploit?id=0F6D6E5B-4D75-592B-90F5-ED26A03C8D4A
# CVE-2023-4047 PoC By Wild Pointer
* Read Research: https://wildptr.io/winrar-cve-2023-40477-poc-new-vulnerability-winrar-security-research/
* Recvol3.cpp Vulnerability: https://www.rarlab.com/vuln_rev3_names.html, https://www.win-rar.com/
* Vulnerable: WinRAR <= 6.22
# How to Test?
You can generate your own PoC OR just test attached demo RAR file (verified to crash winrar-6.22 upon extraction).
1. PoC Generate - follow `cve_2023_40477_poc.py`
2. Demo RAR file - Just extract `Rar.rar` from `example_poc_after_gen`.
# PoC Crash Images
1. Memset Crash-
<img src="https://wildptr.io/wp-content/uploads/2023/08/memset_crash_poc.png" width="920" height="560" />
2. Heap Overflow in Winrar -
<img src="https://wildptr.io/wp-content/uploads/2023/08/heapoverflow_crash_poc.png" width="920" height="560"/>
# DISCLAIMER
Use at your own responsibility - The publisher, author or any of its affiliates aren't responsible for any actions caused, made or generated by using this code and/or repository.
This is just & solely for educational purposes and includes demo example only, not to harm or cause any impact.
Use this for educational purposes only. Do not use this piece of code for any unethical or unintended behaviour.