AT TFTP Server Long Filename Buffer Overflow Exploit Update 2

The vulnerability is caused due to a boundary error during the processing of TFTP Read/Write request packet types. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted packet with an overly long filename field.

This update ensures that the program receives all data.

This update fixes an error on Impact v12.3.
Exploit Type - Old
Exploits/Remote
Exploit Platform
Exploit Type
Product Name