This exploit demonstrates a Denial of Service (DoS) vulnerability in RarmaRadio 2.72.5 by overwriting a configuration field with a large buffer (20,000 'K' characters). The PoC generates a malicious input file that, when pasted into the application's network settings, triggers a crash.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:RarmaRadio 2.72.5
No auth needed
Prerequisites:Access to the RarmaRadio application GUI · Ability to modify network settings in the application