This exploit triggers a buffer overflow in the target software by sending a maliciously crafted HTTP GET request with an oversized path. The PoC demonstrates a DoS condition via segmentation fault and memory corruption, as evidenced by the included GDB traces.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:torrent-stats (version unspecified)
No auth needed
Prerequisites:Network access to the target service on port 8080