This application simulates a logging service that accepts messages from clients and writes them to a log file. The application has a vulnerability. Your goal is to find the vulnerability and write an exploit.
Steps and guildelines:
- Download the source code and build the application
- Understand the application and identify the communication mechanism it uses
- Find the vulnerability
- Write an exploit