Many vulnerbilities involving files and file operations rely on a program anticipating that accessing a file resides in a certain directory and then manipulating predetermined directory.
If an attacker manipulates the file system in a way that makes that program access a different file than the one intended. This
For instance, this is the technique used by many attacks targeting UNIX symlinks and Windows shortcuts.
...