This exploit targets a local buffer overflow in GNU Typist 2.9.5-2 by overflowing the ARG0 parameter with a NOP sled, shellcode, and manipulated EIP to achieve arbitrary code execution. The shellcode spawns a shell, demonstrating a classic stack-based overflow.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:GNU Typist 2.9.5-2
No auth needed
Prerequisites:Local access to the target system · GNU Typist 2.9.5-2 installed · Python environment