This exploit demonstrates a Denial of Service (DoS) vulnerability in WM Recorder 16.8.1 by overwriting the SEH (Structured Exception Handler) via a crafted input file. The PoC generates a malformed 'crash.txt' file that, when loaded into the application's scheduler, triggers a crash due to improper handling of the input buffer.
Classification
Working Poc 95%
Target:
WM Recorder 16.8.1
No auth needed
Prerequisites:
WM Recorder 16.8.1 installed on Windows 7/10 · Access to the application's scheduler feature