The host is installed with WinRAR through 5.61 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle the crafting of the filename field of the ACE format. Successful exploitation allows attacker to create empty files and folders everywhere in the file system.