This exploit demonstrates a type mismatch vulnerability in Syslog Server 1.2.3 by sending a malformed UDP packet to port 514, causing a crash. The PoC uses a simple echo command piped to netcat to trigger the vulnerability.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:Syslog Server 1.2.3
No auth needed
Prerequisites:Network access to the target syslog server on UDP port 514