nomisec
WORKING POC
by exploitwritter · poc
https://github.com/exploitwritter/CVE-2009-1330_EasyRMToMp3Converter
This repository contains a functional exploit for CVE-2009-1330, targeting a buffer overflow vulnerability in Easy RM to MP3 Converter 2.7.3.700 via a maliciously crafted .m3u file. The exploit includes shellcode and a DEP/ASLR bypass technique using a 'push esp; ret' gadget.
Classification
Working Poc 95%
Target:
Easy RM to MP3 Converter 2.7.3.700
No auth needed
Prerequisites:
Victim must open the maliciously crafted .m3u file with the vulnerable software
nomisec
WORKING POC
by adenkiewicz · poc
https://github.com/adenkiewicz/CVE-2009-1330
This repository contains a functional exploit for CVE-2009-1330, a buffer overflow vulnerability in Easy RM to MP3 Converter 2.7.3.700. The exploit uses a crafted M3U file to trigger the overflow, execute shellcode via a ROP gadget, and establish a reverse TCP shell.
Classification
Working Poc 95%
Target:
Easy RM to MP3 Converter 2.7.3.700
No auth needed
Prerequisites:
Vulnerable version of Easy RM to MP3 Converter installed · Network connectivity for reverse shell
nomisec
WORKING POC
by war4uthor · poc
https://github.com/war4uthor/CVE-2009-1330
This repository contains a functional Python exploit for CVE-2009-1330, targeting a buffer overflow vulnerability in Easy RM to MP3 Converter. The exploit generates a malicious .m3u file with a crafted payload to achieve remote code execution via a JMP ESP instruction in MSRMCcodec02.dll.
Classification
Working Poc 95%
Target:
Easy RM to MP3 Converter
No auth needed
Prerequisites:
Vulnerable version of Easy RM to MP3 Converter installed · User interaction to open the malicious .m3u file
exploitdb
WORKING POC
VERIFIED
by d3b4g · perllocalwindows
https://www.exploit-db.com/exploits/10602
This exploit targets a buffer overflow vulnerability in Easy RM to MP3 27.3.700 by crafting a malicious .m3u file with a long string of 'A's to overwrite the EIP and redirect execution to a shellcode that launches calc.exe.
Classification
Working Poc 95%
Target:
Easy RM to MP3 27.3.700
No auth needed
Prerequisites:
Victim must open the malicious .m3u file
exploitdb
WORKING POC
VERIFIED
by bibi-info · clocalwindows
https://www.exploit-db.com/exploits/10619
This exploit leverages a buffer overflow vulnerability in Easy RM to MP3 Converter 27.3.700 by crafting a malicious .m3u file. The payload overwrites the EIP with a kernel32.dll address and executes a calc.exe payload via alphanumeric shellcode.
Classification
Working Poc 95%
Target:
Easy RM to MP3 Converter 27.3.700
No auth needed
Prerequisites:
Victim must open the malicious .m3u file with the vulnerable software
exploitdb
WORKING POC
VERIFIED
by Oh Yaw Theng · pythonlocalwindows
https://www.exploit-db.com/exploits/14550
This exploit leverages a local buffer overflow in Easy RM to MP3 2.7.3.700 via crafted .m3u (or other supported) playlist files to achieve remote code execution by overwriting the EIP register and executing shellcode.
Classification
Working Poc 95%
Target:
Easy RM to MP3 2.7.3.700
No auth needed
Prerequisites:
Victim must open the malicious playlist file with the vulnerable software
exploitdb
WORKING POC
VERIFIED
by Fitzl Csaba · pythonlocalwindows
https://www.exploit-db.com/exploits/39933
This exploit leverages a buffer overflow in Easy RM to MP3 Converter 2.7.3.700 via a malformed .m3u file, bypassing DEP and ASLR with a ROP chain to achieve arbitrary code execution. The ROP chain is meticulously crafted to call VirtualAlloc and execute shellcode.
Classification
Working Poc 95%
Target:
Easy RM to MP3 Converter 2.7.3.700
No auth needed
Prerequisites:
Target must open a malicious .m3u file
exploitdb
WORKING POC
VERIFIED
by Stack · pythonlocalwindows
https://www.exploit-db.com/exploits/8427
This exploit targets a stack overflow vulnerability in Easy RM to MP3 Converter by crafting a malicious .pls file with a long string to overwrite the EIP and execute shellcode. The shellcode is designed to spawn a reverse shell or execute arbitrary commands.
Classification
Working Poc 95%
Target:
Easy RM to MP3 Converter (version not specified)
No auth needed
Prerequisites:
Victim must open the malicious .pls file with the vulnerable software
exploitdb
WORKING POC
VERIFIED
by Cyber-Zone · perldoswindows
https://www.exploit-db.com/exploits/8407
This Perl script generates a malicious .M3U file that triggers a local stack overflow in ASX to MP3 Converter when processed. The exploit uses a long HTTP URL string (26121 'A' characters) to overwrite the stack, leading to arbitrary code execution (EIP control).
Classification
Working Poc 95%
Target:
ASX to MP3 Converter (version unspecified)
No auth needed
Prerequisites:
Victim must open the crafted .M3U file with the vulnerable ASX to MP3 Converter software
exploitdb
WORKING POC
VERIFIED
by Cyber-Zone · perldoswindows
https://www.exploit-db.com/exploits/8404
This Perl script generates a malicious .M3U file that triggers a local stack overflow in RM Downloader when parsed. The exploit uses a long HTTP URL (26109 'A' characters) to overwrite the EIP register, demonstrating a classic buffer overflow vulnerability.
Classification
Working Poc 90%
Target:
RM Downloader (version unspecified)
No auth needed
Prerequisites:
Victim must open the crafted .M3U file with RM Downloader
exploitdb
WORKING POC
VERIFIED
by Cyber-Zone · perldoswindows
https://www.exploit-db.com/exploits/8405
This Perl script generates a malicious .M3U file that triggers a local stack overflow in Mini-stream RM-MP3 Converter when parsed. The exploit uses a long HTTP URL string (26121 'A' characters) to overwrite the stack, leading to arbitrary code execution (EIP control).
Classification
Working Poc 95%
Target:
Mini-stream RM-MP3 Converter (version unspecified)
No auth needed
Prerequisites:
Victim must open the crafted .M3U file with Mini-stream RM-MP3 Converter
exploitdb
WORKING POC
VERIFIED
by Cyber-Zone · perldoswindows
https://www.exploit-db.com/exploits/8402
This Perl script generates a malicious .M3U file that triggers a local stack overflow in Mini-stream Ripper when opened. The exploit uses a long HTTP URL (26129 'A' characters) to overwrite the stack, leading to arbitrary code execution.
Classification
Working Poc 90%
Target:
Mini-stream Ripper (version unspecified)
No auth needed
Prerequisites:
Victim must open the malicious .M3U file in Mini-stream Ripper
exploitdb
WORKING POC
VERIFIED
by Cyber-Zone · perldoswindows
https://www.exploit-db.com/exploits/8403
This Perl script generates a malicious .M3U file that triggers a local stack overflow in WM Downloader when parsed. The exploit leverages a buffer overflow vulnerability (CVE-2009-1329) by crafting an overly long HTTP URL in the M3U file, leading to arbitrary code execution.
Classification
Working Poc 95%
Target:
WM Downloader (version unspecified)
No auth needed
Prerequisites:
Victim must open the malicious .M3U file in WM Downloader