This exploit demonstrates a buffer overflow vulnerability in Ricoh DC FTP (SR10) v1.1.0.8 by sending an excessively large string (81300 'A' characters) to the FTP server, causing a denial of service (DoS). The exploit targets the FTP service on port 21 and does not require authentication.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:Ricoh DC FTP (SR10) v1.1.0.8
No auth needed
Prerequisites:Network access to the target FTP server on port 21