This exploit demonstrates a stack-based buffer overflow in ABC2MTEX 1.6.1 via an unsafe `strcpy` at `abc.c:241`, allowing an attacker to overwrite the return address by providing a long input filename. The PoC triggers a segmentation fault, confirming the vulnerability.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:ABC2MTEX 1.6.1
No auth needed
Prerequisites:Access to execute the binary with a crafted filename argument