Deep dive in Lexmark Perceptive Document Filters Exploitation
Unfortunately, from the attacker perspective, all components have NX compatibility which requires us to build a ROP chain to bypass it. We also can't make a simple PLT overwrite because there is not an interest