Seagate Central Remote Root

Discussion in 'News Aggregator' started by Packet Storm, 5 Jun 2015.

  1. Packet Storm

    Packet Storm Guest

    Seagate Central by default has a passwordless root account (and no option to change it). This exploit logs into the ftp server and uploads a php shell to the webroot. From there, the uploaded shell can execute commands with root privileges as lighttpd.

    Continue reading...
     

Share This Page

Loading...