This exploit sends a malformed Memcached protocol packet with an oversized key length and body length to trigger a buffer overflow. The PoC constructs a packet with a 1000-byte payload ('A'*1000) and sends it to a target server, potentially causing a denial-of-service or remote code execution depending on the vulnerability.
Classification
Working Poc 90%
Target:
Memcached (version not specified)
No auth needed
Prerequisites:
Network access to the target Memcached server