The specific flaw exists within FastBackMount.exe which listens by default on TCP port 30051. When handling opcode 0x09 packets, the process blindly copies user supplied data into a stack-based buffer within CMountDismount::GetVaultDump. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
This exploit add support for x86_64.
This exploit add support for x86_64.
CVE Link
Exploit Type - Old
Exploits/Remote
Exploit Platform
Product Name