Tags: libc_database got format-string plt 

Rating:

There is a `format string` vulnerability that allows you to leak libc addresses and overwrite `GOT` entry in order to execute `/bin/sh`. Using `libc database` is required: https://github.com/niklasb/libc-database

Original writeup (https://github.com/sajjadium/ctf-writeups/tree/master/UTCTF/2019/BabyEcho).