Walla
Last updated
Last updated
Connecting to port 8091 asks for credentials for "RaspAP". Which is Debian-based software for wireless routers.
Looking up the default credentials we can log in with admin:secret
.
Looking at the exploit code we can see it is trying to interact with webconsole.php
This along with telnet running on the target machine we can obtain a good reverse shell:
Running linpeas.sh on the target reveals the following interesting information:
As www-data we can delete the file /home/walter/wifi_reset.py and replace it with a Python reverse shell of the same name:
Then execute with sudo
as root:
Checking the settings we are running version 2.5. PoC exists here:. However, I was unable to get code execution from this.
We can manually browse this at: .