This exploit targets a buffer overflow vulnerability in General Device Manager version 2.5.2.2. The overflow is triggered through the Structured Exception Handler (SEH).
- Exploit Type: Buffer Overflow (SEH)
- Exploit Date: 30.07.2023
- Software Link: General Device Manager 2.5.2.2
- Alternate Download Link: General_DeviceManager.zip
- Exploit Author: Ahmet Ümit BAYRAM
- Tested Version: 2.5.2.2
- Tested Platform: Windows 10 64bit
This exploit targets a buffer overflow vulnerability in General Device Manager version 2.5.2.2. The overflow is triggered through the Structured Exception Handler (SEH). This exploit could potentially lead to the compromise of the target system.
- Run the Python code:
exploit.py
. - Open the generated
pwned.txt
file and copy its content. - Open General Device Manager and click on "Add Device."
- Paste the content of
pwned.txt
into the 'IP Address' field. - Click 'OK.'
- Use
nc.exe
to establish a connection to your local IP address and the specified port. - You now have a bind shell on the target system.
This exploit is licensed under the MIT License. For more information, please refer to the license file.
If you have any questions or feedback regarding the exploit, feel free to send an email to ahmetumitbayram@protonmail.com.