This exploit generates a large payload of Unicode characters designed to trigger a memory corruption vulnerability in WhatsApp for iOS versions 2.18.31 and prior. The payload is sent as a message to cause resource exhaustion and potentially a denial-of-service condition.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:WhatsApp for iOS 2.18.31 and prior
No auth needed
Prerequisites:Access to send a message to a WhatsApp user or group