This exploit demonstrates a buffer overflow vulnerability in Masm32v11r by overwriting the SEH (Structured Exception Handler) with a crafted payload. The PoC generates a malicious text file that, when processed by Masm32's QUICK EDITOR, triggers a crash due to improper bounds checking.
Classification
Working Poc 90%
Target:
Masm32v11r
No auth needed
Prerequisites:
Masm32v11r installed on Windows · Access to Masm32's QUICK EDITOR