Kazamayc / vuln

3 stars 0 forks source link

some questions #1

Open peris-navince opened 1 year ago

peris-navince commented 1 year ago

Hello, I have some doubts about the CVE you submitted. After sending the constructed POC, for example, ls > /tmp/1.txt;\r\n", what method or tool did you use to check that the 1.txt file appears in the tmp folder? Is it burp suite? Best wishes!

Kazamayc commented 1 year ago

When you are exploring IoT vulnerabilities, you either use tools for simulation and emulation, or you connect to physical devices through telnet or SSH. You already have access to the shell of the IoT device; you are just testing whether your proof of concept (PoC) can be exploited.