2022-09-07 14:41:21 +02:00
2022-09-07 14:39:21 +02:00
2022-09-07 14:39:21 +02:00
2021-05-11 09:33:54 +02:00
2022-09-07 14:41:21 +02:00
2021-05-11 09:59:23 +02:00
2022-09-07 14:39:21 +02:00
2022-09-07 14:41:21 +02:00

MW3ProtocolExploit

Disclaimer

This software has been created purely for the purposes of academic research. It is not intended to be used to attack other systems. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

Summary

This software contains a proof of concept for a MW3 vulnerability that was first discovered in late 2019. The exploit has since been mitigated, but the underlying bug in the client remains.

How does this work?

The exploit works by modifying the server name with a malicious string of characters.

Compile from source

  • Clone the Git repo. Do NOT download it as ZIP, that won't work.
  • Run premake5 vs2022 or simply use the delivered generate.bat.
  • Build via solution file in build\server-list-exploit.sln.
Description
MW3 Server protocol exploit
Readme BSD-3-Clause 715 KiB
Languages
C++ 61.8%
Lua 36.6%
Batchfile 1.6%