NetBIOS Cache Corruption

After successful attack, network traffic from the target to an arbitrary IP address can be redirected.
Exploit Platform
Exploit Type
Product Name