I wont be posting full analysis on this blog. here is how control jumps to the shellcode for this vulnerability: Thanks, Hardik