-
-
Save garoto/f741b889c0b0786431fdc384ea7a0582 to your computer and use it in GitHub Desktop.
CVE-2025-50753 - Mitrastar GPT-2741 GNAC-N2 root privilege escalation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ## Correction Notice: CVE-2025-50753 Exploit Method | |
| **Important:** The CVE description incorrectly omits | |
| the required newline character. | |
| The correct command argument to gain root access on | |
| Mitrastar GPT-2741 GNAC-N2 devices is: | |
| "\n/bin/sh" | |
| *Note:* The quotes and the leading newline meta-character | |
| are essential tor the exploit to succeed. | |
| --- | |
| Mitrastar GPT-2741GNAC-N2 devices are provided with access through | |
| ssh into a restricted default shell. This is called the "support" | |
| user and the credential to log in is a sticker on the router as | |
| provided by Vivo (Telefonica Brasil) on their Vivo Fibra offer. | |
| The command "deviceinfo show file" is supposed to be used from | |
| restricted shell to show files and directories. By providing | |
| "\n/bin/sh" (quotes included, note the newline special character) | |
| to the argument of this command will drop a root shell. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment