Details of the vulnerability have not been revealed yet. So far, it has been known to exist in both uTorrent for Windows and uTorrent Web and allows malicious code to run through the application’s remote control function – the exploit works even if the user does not enable the Web UI feature. By exploiting the loophole, a hacker can remotely manage user downloads. This seems almost harmless, but it makes room for a malicious file to be downloaded directly to the Windows startup folder, for example, which would cause the malware to run at the next boot. BitTorrent reported that the problem was fixed in uTorrent 3.5.3.44352 for Windows and uTorrent Web 0.12.0.502. The corrected version for Windows is in beta and will be distributed to users in the next few days; you can download it from the uTorrent website. It is worth remembering that uTorrent, although still the most popular BitTorrent client in the world, has a somewhat troubled history: a few years ago, it started to install cryptocurrency miners and reports have recently surfaced that the program’s ads come with malware. So, what do you think about this? Simply share all your views and thoughts in the comment section below.