exploit-dbhttps://www.proteansec.com/linux/pfsense-vulnerabilities-part-2-command-injection/https://www.proteansec.com/linux/pfsense-vulnerabilities-part-2-command-injection/Example of original request
Modifying request to get RCE
I received a netcat connectionIt is executed as a rootIt doesn’t work. I don’t get netcat connectionUsing dot instead of slash worked, but it is not my purposeThere is a bad char, so I can’t use slash.
Environmental variables may contain slash, so they can be used as a variable to inject “/” in command
Now I got output of find / command
I know the location, so I can use this knowledge to get context of the flag
I got the root flag
Box is rooted, although I want to try get reverse shell: