mirror of
https://github.com/duality084/CVE-2023-33381-MitraStar-GPT-2741GNAC.git
synced 2025-01-24 17:57:58 -03:00
Update README.md
This commit is contained in:
parent
966ac2cd2e
commit
f98aa2276a
1 changed files with 1 additions and 0 deletions
|
@ -6,6 +6,7 @@ CVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC
|
|||
### Vulnerability Description:
|
||||
|
||||
Upon logging in via SSH, I immediately noticed the limited set of available commands and options. It became evident that I was indeed confined to a restricted shell environment.
|
||||
|
||||
![image](https://github.com/duality084/CVE-2023-33381-MitraStar-GPT-2741GNAC/assets/7117259/b5840811-334d-45d5-b3e3-7863969165a3)
|
||||
|
||||
After exploring several known vulnerabilities, I decided to delve into the search for new ones. To begin, I logged into the administrative portal and began testing various functionalities that could potentially result in OS command injection. Within the Diagnostic menu, I came across a particular feature that allowed me to test connectivity using the ping and traceroute commands.
|
||||
|
|
Loading…
Add table
Reference in a new issue