This exploit demonstrates a local buffer overflow in Printoxx <= 2.1.2 due to unchecked input length in strcpy calls for filename/directory arguments. The PoC triggers the overflow using a long string of 'A' characters, but effectiveness is limited by modern protections like stack canaries.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Theoretical
Target:Printoxx <= 2.1.2
No auth needed
Prerequisites:Local access to the target system · Printoxx installed and executable