Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.
b7866a8811b382a054ae7fb62572e6e373eb33af3e44cfec542ed5f71f5dca85
Orbz versions 2.10 and below suffer from a buffer overflow in the password field of the join packet.
605ee016d735f2c5fda4cfdac9fb1f4a8b1e1063b3e131c04441e54a78312a10