Attacke can make fake suid binary on network disk by using protocol weakness.
vulners.com/securityvulns/securityvulns:doc:16415