From the lab

Research & write-ups.

Deep dives into vulnerability research, exploitation techniques, and security analysis from the STAR Labs team.

Research Apr 01, 2026

CHECK Removed, Context Confused, Checkmate Achieved

TL;DR In January 2026, the Chrome Releases blog announced several security fixes across different Chrome components. One entry caught our attention: …

ByShreyas Penkar Read19 min
Research Feb 05, 2026

Pickling the Mailbox: A Deep Dive into CVE-2025-20393

A single-byte integer overflow in Cisco's EUQ RPC protocol chains into Python pickle deserialization, achieving unauthenticated RCE with a single HTTP request …

ByLi Jiantao & Read12 min
Research Nov 10, 2025

HEX ADVENT 2025: Rules & Information

Information This is a solo CTF event open to women residing in Singapore or Malaysia. To register and be eligible for the prizes: Register on CTFd, and select …

BySTAR Labs SG Read2 min
Research Sep 15, 2025

Summer Pwnables: lz1 Solution

TL;DR 🚀 We’re turning a simple compression library into a shell delivery service! This writeup exploits a buffer overflow in lz1/lz77 decompression by …

ByZafir Rasyidi Taufik Read8 min
Research Sep 15, 2025

Summer Pwnables: Temporal Paradox Engine Solution

Last month, Jacob asked me to create a CTF challenge for the Summer Pwnables event. I went with a kernel pwnable since my goal was to teach students some more …

ByMuhammad Alifa Ramdhan Read13 min
Research Sep 02, 2025

Fuzzing a Printer: Pre-auth RCE in a Network IoT Device

Printers have three things going for them from an attacker’s perspective: they live on the corporate network, they trust far too much from far too many …

ByPoh Jia Hao Read1 min fuzzingiotprinterrce
Research Aug 18, 2025

[Updates] Summer Pwnables 🔥

[Updates] Summer Pwnables 2025 Major Announcement: ISD Sponsorship We are pleased to announce that Internal Security Department (ISD) is sponsoring Summer …

BySTAR Labs SG Read2 min
Research Jul 16, 2025

My `Blind Date` with CVE-2025-29824

In April 2025, Microsoft patched a vulnerability that had become a key component in sophisticated ransomware attack chains. CVE-2025-29824, an use-after-free …

ByOng How Chong Read10 min
Research Jul 10, 2025

Fooling the Sandbox: A Chrome-atic Escape

For my internship, I was tasked by my mentor Le Qi to analyze CVE-2024-30088, a double-fetch race condition bug in the Windows Kernel Image ntoskrnl.exe. A …

ByVincent Yeo Read11 min
Research May 30, 2025

Gone in 5 Seconds: How WARN_ON Stole 10 Minutes

As part of my internship at STAR Labs, I was tasked to conduct N-day analysis of CVE-2023-6241. The original PoC can be found here, along with the accompanying …

ByTan Ze Jian Read16 min
Research May 28, 2025

Badge & Lanyard Challenges @ OBO 2025

Introduction We are back with Round 2 of the Off-By-One conference — where bits meet breadboards and bugs are celebrated! 🐛⚡ If you are into hardware and IoT …

ByManzel Seet & Sarah Tan Read14 min
Research May 20, 2025

Lessons From Pwn2Own Berlin 2025: Building a Hypervisor Escape

At Pwn2Own Berlin 2025, STAR Labs took home Master of Pwn for a chain that escaped a major hypervisor from inside a guest VM. This is the short version of how …

ByBilly Jheng Bing-Jhong Read2 min pwn2ownvirtualizationexploit-development
Research Mar 17, 2025

STAR Labs Windows Exploitation Challenge 2025 Writeup

STAR Labs Windows Exploitation Challenge Writeup Over the past few months, the STAR Labs team has been hosting a Windows exploitation challenge. I was lucky …

ByGuest Post by Võ Văn Tiến Dũng Read9 min
Research Jan 12, 2025

Celebrating 7 Years of STAR Labs SG

🎉🎊 Cheers to 7 Amazing Years! 🎊🎉 On 8th January 2018, STAR Labs SG Pte. Ltd. was born with a simple but bold idea: to do fun offensive research that protects …

BySTAR Labs SG Read5 min
Research Jan 01, 2025

STAR Labs 2025 New Year Exploitation Challenge

Think you’ve got what it takes to pop shells and snag your ticket to… RE//verse and Off-By-One? 😏 🔥 Windows Exploitation Challenge 🔥 Get SYSTEM …

BySTAR Labs SG Read1 min
Research Dec 24, 2024

All I Want for Christmas is a CVE-2024-30085 Exploit

TLDR CVE-2024-30085 is a heap-based buffer overflow vulnerability affecting the Windows Cloud Files Mini Filter Driver cldflt.sys. By crafting a custom reparse …

ByCherie-Anne Lee Read21 min
Research Dec 24, 2024

Behind the Scenes: Understanding CVE-2022-24547

TL;dr Vulnerabilities can often be found in places we don’t expect, and CVE-2022-24547 in CastSrv.exe is one of the examples. CVE-2022-24547 is a privilege …

ByĐào Tuấn Linh Read5 min
Research Jul 22, 2024

#BadgeLife @ Off-By-One Conference 2024

Introduction As promised, we are releasing the firmware and this post for the Off-By-One badge about one month after the event, allowing interested participants …

ByManzel Joseph Seet Read13 min
Research Mar 18, 2024

Route to Safety: Navigating Router Pitfalls

Introduction Wi-Fi routers have always been an attractive target for attackers. When taken over, an attacker may gain access to a victim’s internal …

ByDaniel Lim Wee Soong Read48 min
Research Mar 03, 2023

CS-Cart PDF Plugin Unauthenticated Command Injection

Summary A command injection vulnerability exists in CS-Cart’s HTML to PDF converter (https://github.com/cscart/pdf) allowing unauthenticated attackers to …

ByNgo Wei Lin Read4 min
Research Dec 21, 2022

Deconstructing and Exploiting CVE-2020-6418

As part of my internship at STAR Labs, I conducted n-day analysis of CVE-2020-6418. This vulnerability lies in the V8 engine of Google Chrome, namely its …

ByDaniel Toh Jing En Read15 min
Research Jul 21, 2022

Gitlab Project Import RCE Analysis (CVE-2022-2185)

At the beginning of this month, GitLab released a security patch for versions 14->15. Interestingly in the advisory, there was a mention of a post-auth RCE …

ByNguyễn Tiến Giang (Jang) Read11 min
Research Jan 21, 2022

The Cat Escaped from the Chrome Sandbox

Introduction On 13th September 2021, Google published the security advisory for Google Chrome. That advisory states that Google is aware of two vulnerabilities …

ByHung Tien Tran Read12 min
Research Nov 16, 2021

Diving into Open-source LMS Codebases

Introduction Looking to practice on source code review, I had been diving into how open-source LMS codebases are structured in order to find undiscovered …

ByPoh Jia Hao Read14 min
Research Apr 12, 2021

You Talking To Me?

What is WebDriver and How does it work? WebDriver is a protocol used for web browser automation. It can drive a browser to perform various tests on web pages as …

ByLi JianTao Read11 min
Research Nov 13, 2020

Instrumenting Adobe Reader with Frida

Frida is an open-source dynamic instrumentation toolkit that has become popular in recent years, and its use in mobile security is especially prevalent. In this …

ByAlan Chang Read10 min
Research Sep 25, 2020

Pwn2Own 2020: Oracle VirtualBox Escape

In this post, we will cover the vulnerabilities used at Pwn2Own 2020 for the Oracle VirtualBox escape. These two vulnerabilities affect Oracle VirtualBox 6.1.4 …

ByPham Hong Phi Read9 min
Research Sep 04, 2020

This Font is not Your Type

Half a year ago, I found a vulnerability in libFontParser.dylib, which is a part of CoreGraphics library that is widely used in macOS, iOS, iPadOS to parse and …

ByPeter Nguyen Vu Hoang Read3 min
Research Aug 07, 2020

ASUSWRT URL Processing Stack Buffer Overflow

While processing the URL for any blacklisted XSS list like the script tag in the check_xss_blacklist function, a stack buffer overflow is possible by extending …

ByLucas Tay Read18 min
Research Apr 10, 2020

TianFu Cup 2019: Adobe Reader Exploitation

Last year, I participated in the TianFu Cup competition in Chengdu, China. The chosen target was the Adobe Reader. This post will detail a use-after-free bug of …

ByPhan Thanh Duy Read10 min
Research Apr 03, 2020

Adventures in Hypervisor: Oracle VirtualBox Research

I have been into the vulnerability research field for a while now, and VirtualBox is my very first target. I have learned a lot along the way and I hope that …

ByPham Hong Phi Read11 min