Step 1: Target Identification: Identify a Wing FTP Server instance running a vulnerable version (prior to 7.4.4).
Step 2: Craft Request: Construct an HTTP GET request to loginok.html or any page that uses the UID cookie.
Step 3: Payload Delivery: Include a UID cookie in the request with an extremely long string value (e.g., a string of 1000+ 'A' characters).
Step 4: Request Submission: Send the crafted HTTP request to the target server.
Step 5: Information Disclosure: Analyze the server's response. The full installation path of Wing FTP Server will be revealed in the response body or headers (e.g., in an error message or debugging information).