## Tweets
- https://twitter.com/chompie1337/status/1583666434668101637
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Remotely exploiting CVE-2022-34718, TCP/IP RCE bug <a href="https://twitter.com/hashtag/EvilEsp?src=hash&ref_src=twsrc%5Etfw">#EvilEsp</a> for DoS. This is a bug in Ipv6 fragmentation/IpSec, which allows OOB write if an Ipv6 fragment is contained inside an IpSec ESP payload. <a href="https://t.co/k1aoZX2kWq">pic.twitter.com/k1aoZX2kWq</a></p>— spookie chompie (@chompie1337) <a href="https://twitter.com/chompie1337/status/1583666434668101637?ref_src=twsrc%5Etfw">October 22, 2022</a></blockquote>
## Links
- https://doar-e.github.io/blog/2021/04/15/reverse-engineering-tcpipsys-mechanics-of-a-packet-of-the-death-cve-2021-24086/