Hacker News new | past | comments | ask | show | jobs | submit login

Looks like here is where it gets interesting: https://github.com/socoola/yhrouter/blob/master/user/goahead...

An example fo the inbound command structure, then code further below to execute it and respond.

It listens on the LAN interface (assuming the value shown is what it says it is) for datagram requests. Unless I'm missing something, that seems to indicate an attacker must already be on the same network.

It does shell out the commands it receives - so perhaps more interesting would be look and see what kinds of accessible binaries and scripts ship on the device.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: