mirror of
https://github.com/diamante0018/MW3ProtocolExploit.git
synced 2025-02-18 09:59:04 +00:00
MW3ProtocolExploit
Disclaimer
This software has been created purely for the purposes of academic research. It is not intended to be used to attack other systems. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.
Summary
This software contains a proof of concept for a MW3 vulnerability that was first discovered in late 2019. The exploit has since been mitigated, but the underlying bug in the client remains.
How does this work?
The exploit works by modifying the server name with a malicious string of characters.
Compile from source
- Clone the Git repo. Do NOT download it as ZIP, that won't work.
- Run
premake5 vs2022
or simply use the deliveredgenerate.bat
. - Build via solution file in
build\server-list-exploit.sln
.
Description
Languages
C++
61.8%
Lua
36.6%
Batchfile
1.6%