This exploit demonstrates a heap corruption vulnerability in MiniWeb HTTP server (build 300) by sending a malformed POST request with a crafted Content-Length header and a payload of 'A' characters, leading to a remote denial-of-service (DoS) condition.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:MiniWeb HTTP server (build 300, built on Feb 28 2013)
No auth needed
Prerequisites:Network access to the target server · MiniWeb HTTP server running on port 8000