How can setuid C program be used to exploit open() system call for Privilege Escalation [closed]
There is one SetUID program in C that passes command-line arguments to open system call as open(argv[1], O_RDONLY);
Can this be exploited for privilege escalation? If yes with which command line?