This shouldn’t actually be possible, but thanks to the magic of vulnerabilities it is. However, that’s only because I’ve exploited the router and enabled the developer backdoor. Above, I’ve included a screenshot where I appear to have a root shell. The other thing that’s important to know is that users don’t actually have access to a real shell on RouterOS. The trick is figuring out how to use that space to achieve and maintain execution. While all of the system’s executables appear to reside within read-only space, there does appear to be some read-write space, both tmpfs and persistent, that an attacker can manipulate. The storage the user has access to as seen from a root shell and Webfig
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |