This exploit generates a malformed UTF-8 payload designed to trigger a remote memory corruption vulnerability in WhatsApp for iOS versions 2.17.52 and prior. The payload, when sent as a message, causes the application to crash repeatedly until the message is manually removed.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:WhatsApp iOS 2.17.52 and prior
No auth needed
Prerequisites:Ability to send a message to the target WhatsApp user