Skip to content

Conversation

@CyberForgeEx
Copy link

This PR addresses the lack of input validation for command-line arguments in the C-based Metasploit stager client, which could cause crashes or undefined behavior when invalid inputs (e.g., null, empty, or non-numeric port) are provided. The changes improve robustness by ensuring argv[1] (host) and argv[2] (port) are valid before use.

Please review and let me know if additional changes or tests are needed!

Validate argv[1] (host) to ensure it is non-null and non-empty, and argv[2] (port)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant