Hackers of CypherCon Season 2 Episode 27
Sometimes, owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo, we show how we were able to chain multiple vulnerabilities in the Lenovo ix4-300d network attached storage device into a remote exploit that can be executed with little user interaction.
Serie: Hackers of CypherCon
Episode Title: Journey to Command Injection with Rick Ramgattie
Air Date: 2020-03-27