Hackers of CypherCon
Journey to Command Injection with Rick Ramgattie (2x27)
:
Sometimes, owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo, we show how we were able to chain multiple vulnerabilities in the Lenovo ix4-300d network attached storage device into a remote exploit that can be executed with little user interaction.