header-logo
Suggest Exploit
vendor:
Download Accelerator Plus
by:
Krystian Kloskowski (h07)
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Download Accelerator Plus
Affected Version From: 8.x
Affected Version To: 8.6
Patch Exists: Yes
Related CWE: N/A
CPE: a:speedbit:download_accelerator_plus
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP2 Polish
2008

Download Accelerator Plus – DAP 8.x (m3u) 0day Local Buffer Overflow Exploit

This exploit is for Download Accelerator Plus 8.x (m3u) 0day Local Buffer Overflow. The bug was discovered by Krystian Kloskowski (h07) and tested on Download Accelerator Plus 8.6 / XP SP2 Polish. The exploit uses a Windows Execute Command (calc) shellcode and the return address is JMP ESP (SHELL32.DLL / XP SP2 Polish). The exploit creates an evil.m3u file which can be imported and clicked on 'Verify' to execute the shellcode.

Mitigation:

Update to the latest version of Download Accelerator Plus.
Source

Exploit-DB raw data: