
is basically game over. And we found the minimum that's the vulnerable function that basically uh you you can control the buffer the length just like the the the exploit that I showed you in the beginning from a different driver. Uh this is from uh system explorer and it's basically the same exploit. You have control of the buffer, the length of the buffer and if you if you manage to see on top the me move is also not controlling the the the length of what you are sending into. Okay. Uh so basically uh if you want to taking control of the length of what you are sending to the buffer then you have an overflow as well. So you have an
overflow and you can take control of what you are sending into. So, it's basically game