Welcome to the Off-Shore Club

The #1 Social Engineering Project in the world since 2004 !

💣Exploit CVE-2024-34244 - libmodbus v3.1.10 is vulnerable to Buffer Overflow

⚠️Always Remember to keep your identity safe by using a Zero-KYC Zero-AML like https://coinshift.money⚠️

Gold

Maksim

Tactician
Staff member
Administrator
Instructor
USDT(TRC-20)
$450.0
CVE ID : CVE-2024-34244
Published : May 8, 2024, 5:15 p.m. | 32 minutes ago
Description : libmodbus v3.1.10 is vulnerable to Buffer Overflow via the modbus_write_bits function. This issue can be triggered when the function is fed with specially crafted input, which leads to out-of-bounds read and can potentially cause a crash or other unintended behaviors.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Full story here:
 
# exploit/windows/remote/cve_2024_34244.rb
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::Tcp

def initialize(info = {})
super(update_info(info,
'Name' => 'CVE-2024-34244 Exploit',
'Description' => %q{
This module exploits a vulnerability in [Affected System]
},
'Author' => 'E1.Coders',
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2024-34244' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process'
},
'Payload' =>
{
'Space' => 1024,
'BadChars' => "\x00\x0a\x0d\x20"
},
'Platform' => 'win',
'Targets' =>
[
[ 'Windows XP SP3', { 'Ret' => 0x41414141 } ]
],
'DefaultTarget' => 0,
'DisclosureDate' => '2024-05-11'))

register_options(
[
Opt::RPORT(1234)
])
end

def exploit
# Exploit code goes here
end
end
 
  • Like
Reactions: BOP
# exploit/windows/remote/cve_2024_34244.rb
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::Tcp

def initialize(info = {})
super(update_info(info,
'Name' => 'CVE-2024-34244 Exploit',
'Description' => %q{
This module exploits a vulnerability in [Affected System]
},
'Author' => 'E1.Coders',
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2024-34244' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process'
},
'Payload' =>
{
'Space' => 1024,
'BadChars' => "\x00\x0a\x0d\x20"
},
'Platform' => 'win',
'Targets' =>
[
[ 'Windows XP SP3', { 'Ret' => 0x41414141 } ]
],
'DefaultTarget' => 0,
'DisclosureDate' => '2024-05-11'))

register_options(
[
Opt::RPORT(1234)
])
end

def exploit
# Exploit code goes here
end
end
Thank you for this POC
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Friendly Disclaimer We do not host or store any files on our website except thread messages, most likely your DMCA content is being hosted on a third-party website and you need to contact them. Representatives of this site ("service") are not responsible for any content created by users and for accounts. The materials presented express only the opinions of their authors.
🚨 Do not get Ripped Off ! ⚖️ Deal with approved sellers or use RTM Escrow on Telegram
Gold
Mitalk.lat official Off Shore Club Chat


Gold

Panel Title #1

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Panel Title #2

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Top