This exploit targets a format string vulnerability in lbreakout2 server (versions 2-2.5+). It sends a crafted UDP packet with shellcode followed by a format string payload to achieve remote code execution by overwriting memory via snprintf().
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:lbreakout2 server (2-2.5-beta1 and later)
No auth needed
Prerequisites:Network access to UDP port 8000 (default) · Vulnerable version of lbreakout2 server