Description
Format string vulnerability in Easy File Sharing (EFS) Web Server 3.2 allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via format string specifiers in the query string argument in an HTTP GET request.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Revnic Vasile · textdoswindows
https://www.exploit-db.com/exploits/27377
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/23792
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0912
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17046
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19178
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/427158/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25135
Scores
EPSS
0.0875
EPSS Percentile
92.5%
Details
Status
published
Products (1)
efs_software/efs_web_server
3.2
Published
Mar 12, 2006
Tracked Since
Feb 18, 2026