This exploit targets a buffer overflow vulnerability in SpyCamLizard v1.230, bypassing SafeSEH by leveraging a heap-based SEH handler to execute alphanumeric shellcode. It sends a maliciously crafted HTTP GET request to trigger the overflow and achieve remote code execution.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:SpyCamLizard v1.230
No auth needed
Prerequisites:Network access to the target system · SpyCamLizard v1.230 running on Windows XP SP3 x86