October 14, 2021

An exploit on telgram trought an image

I was reading of an exploit (now fixed) on telegram in which if you sent a corrupted jpeg you could virtually enter in that account


My question is: A jep is a bunch of bit in which you can’t store commands or functions, so how could the exploit go trought only using a jpeg?



Are commands and functions not a bunch of bits?

Data is data, it’s how you interpret that data that matters.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.