This document summarizes a case study of a remote code execution vulnerability in a publicly available web application called BogusVenture. Due to flaws in the application's file upload functionality, an attacker could craft an HTTP request to upload a malicious file like a DLL that would execute code on the server. The vulnerability was possible due to a lack of authentication on internal pages, bypassable file type validation via direct requests, and a bug in filename canonicalization that allowed traversing to other parts of the file system. The case study aims to demonstrate how these flaws could be exploited to achieve remote code execution without any user credentials.