This exploit demonstrates a classic SEH-based buffer overflow in R v3.4.4, leveraging a crafted input to overwrite the EIP register and execute arbitrary shellcode (a calc.exe payload). The vulnerability is triggered via the 'Language for menus and messages' input field in the GUI preferences.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:R v3.4.4
No auth needed
Prerequisites:Local access to the target system · R v3.4.4 installed on Windows 7