exploitdb
WORKING POC
VERIFIED
by zAx · pythonlocalwindows
https://www.exploit-db.com/exploits/8177
This exploit targets a local stack overflow vulnerability in RadASM 2.2.1.5 by crafting a malicious .RAP file. It leverages a hardcoded EIP overwrite and a Metasploit-generated alphanumeric shellcode to execute 'calc.exe' as a proof-of-concept.
Classification
Working Poc 95%
Target:
RadASM 2.2.1.5
No auth needed
Prerequisites:
Victim must open the malicious .RAP file in RadASM 2.2.1.5 on Windows XP SP2 English