Issues were discovered in Open TFTP Server multithreaded 1.66 and Open TFTP Server single port 1.66. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenTFTPServerMT.exe or the OpenTFTPServerSP.exe binary.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://sourceforge.net/projects/tftp-server/ | product |
https://github.com/an0ry/advisories | third party advisory exploit |
https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26130.md |