This Metasploit module exploits a buffer overflow in the unique_service_name() function of libupnp's SSDP processor. The libupnp library is used across thousands of devices and is referred to as the Intel SDK for UPnP Devices or the Portable SDK for UPnP Devices. Due to size limitations on many devices, this exploit uses a separate TCP listener to stage the real payload.
a7af761c0a55f9166f6f6555c6b5bf62d458d99f52fd09af4ef8ec52d41ace3b
Kies Air suffers from authorization bypass and denial of service vulnerabilities. Android version 4.0.4 build number IMM76D.I747UCALH9 is affected.
426a0fb2aac0ca8cc014f2eaf42bb99b39915cc9ada276b50cb2454adf81aa57