Turn off light

Hackers of CypherCon Season 2 Episode 27

Sometimes, owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo, we show how we were able to chain multiple vulnerabilities in the Lenovo ix4-300d network attached storage device into a remote exploit that can be executed with little user interaction.

Episode Title: Journey to Command Injection with Rick Ramgattie

Air Date: 2020-03-27