Chackal (Esdras DAGO)
banner
0xchackal.bsky.social
Chackal (Esdras DAGO)
@0xchackal.bsky.social
"Vulnerability researcher" doing BB on free time (http://yeswehack.com/hunters/chackal) Also doing some Reverse on many targets but find no vuln 😒


Blogpost: https://medium.com/@chackal
Yes sure, mine is W461ASC-E (I chose this specific version because I asked Trend micro the exact version they wanted to use for the contest to make sure I use the same) running 2.800.020000000.3.R.2022331

If necessary, you can find the sonia binary here on my VPS poc.chackal.ovh/sonia
December 5, 2024 at 12:56 PM
Amazing vulnerabilities, thanks for the sharing!

I just tested and while it took several attempts and a bit of time (~5-7 minutes) the first stage finally worked and the second stage too (on the first try).

Did the failure was related to the leak step and the auth code being not valid?
December 5, 2024 at 12:14 PM