This exploit targets a stack-based buffer overflow in ZSNES v1.51 by overflowing a buffer with a crafted payload containing shellcode, NOPs, and a controlled EIP address. It attempts to execute arbitrary code (a shell) via a classic stack-smashing technique.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:ZSNES v1.51 and prior
No auth needed
Prerequisites:ZSNES v1.51 or prior installed on the target system · Ability to execute the exploit locally