The exploit leverages a vulnerability in Crimson Editor 3.70 where a maliciously crafted configuration file (cedt.cfg) can be used to execute arbitrary code. The PoC is provided as a downloadable configuration file, demonstrating the vulnerability's exploitability.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:Crimson Editor 3.70
No auth needed
Prerequisites:User interaction to load the malicious configuration file