Rapid7 Vulnerability & Exploit Database

Iconics GENESIS32 Integer Overflow Version

Back to Search

Iconics GENESIS32 Integer Overflow Version



The GenBroker service on port 38080 is affected by three integer overflow vulnerabilities while handling opcode 0x4b0, which is caused by abusing the the memory allocations needed for the number of elements passed by the client. This results unexpected behaviors such as direct registry calls, memory location calls, or arbitrary remote code execution. Please note that in order to ensure reliability, this exploit will try to open calc (hidden), inject itself into the process, and then open up a shell session. Also, DEP bypass is supported.


  • Luigi Auriemma
  • Lincoln
  • corelanc0d3r <peter.ve@corelan.be>




Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/scada/iconics_genbroker
msf exploit(iconics_genbroker) > show targets
msf exploit(iconics_genbroker) > set TARGET < target-id >
msf exploit(iconics_genbroker) > show options
    ...show and set options...
msf exploit(iconics_genbroker) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security