The most impacted by these flaws is uTorrent Web, where Ormandy says that an attacker can:
- obtain the RPC server's "authentication secret" to "gain complete control of the [RPC] service," and inherently over the uTorrent Web client. - download malware on the user's computer. - change the default downloads folder location (for example to the /Startup folder so anything the attacker downloads is automatically executed at the next boot-up).
uTorrent의 보안 취약점 때문에 build 3.5.3.44352 (released on 16 Feb 2018) 이후 버전을 사용해야 됩니다.