Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-9544 PoC — EFS Software Easy Chat Server 缓冲区错误漏洞

Source
Associated Vulnerability
Title:EFS Software Easy Chat Server 缓冲区错误漏洞 (CVE-2017-9544)
Description:There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.
Description
SEH BO based exploit for Easy Chat Server on Win 7 32b
Readme
# CVE-2017-9544

Exploit for SEH based buffer overflow in Easy Chat Server (CVE-2017-9544)

Based on:
* pwntools
* msfvenom / reverse\_tcp payload
* ropper
* x64dbg

Vulnerable app available at https://www.exploit-db.com/exploits/42155

## Setup

* Set victim IP to 192.168.15.100 and start Easy Chat Server.
* Set attacker IP to 192.168.15.101 and run `python main.py`
* Wait for reverse shell
File Snapshot

[4.0K] /data/pocs/0ad2fe1f7b5d908d434fae64078feb4e46350f3a ├── [5.2K] main.py └── [ 395] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →