vendor:
TapinRadio
by:
Victor Mondragón
7.8
CVSS
HIGH
Denial of Service
N/A
CWE
Product Name: TapinRadio
Affected Version From: 2.11.6
Affected Version To: 2.11.6
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 7 Service Pack 1 x64
2019
TapinRadio 2.11.6 – ‘Address’ Denial of Service (PoC)
TapinRadio 2.11.6 is vulnerable to a denial of service attack when a maliciously crafted 'Address' field is supplied. An attacker can exploit this vulnerability by running a python code to generate a maliciously crafted 'Address' field, copying the content to clipboard, opening TapinRadio, selecting 'Settings' > 'Preferences' > 'Miscellaneous', selecting 'Set Application Proxy...', pasting the clipboard in the 'Address' field, typing '444' in the 'Port' field, typing 'test' in the 'Username' field, typing '1234' in the 'Password' field, selecting 'OK' and 'OK', and crashing the application.
Mitigation:
N/A