Description: Video presentation showing methodologies and examples of how to exploit embedded platforms, uses a popular consumer broadband router as a case study. The presentation explains how to leverage information leak and a remote code execution flaw alongside an authentication bypass to gain remote root privileges on a device where restrictive privileges were applied.
Tags: Hacking , Vulnerability Analysis , Exploit , Embedded Devices ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.