This exploit demonstrates a remote crash vulnerability in Virata EmWeb R6.0.1 by sending a malformed HTTP request with an excessively long filename, causing the target device to reboot. The PoC is a simple Python script that sends a crafted GET request with a 512-byte 'A' string.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:Virata EmWeb R6.0.1
No auth needed
Prerequisites:Network access to the target device · Target device running Virata EmWeb R6.0.1