Last active
October 1, 2025 21:27
-
-
Save geraldog/2d07fdedbbb79d822e9df4b75f882a63 to your computer and use it in GitHub Desktop.
CVE-2025-50753 - Mitrastar GPT-2741 GNAC-N2 root privilege escalation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ## Correction Notice: CVE-2025-50753 Exploit Method | |
| **Important:** The CVE description incorrectly omits | |
| the required newline character. | |
| The correct command argument to gain root access on | |
| Mitrastar GPT-2741 GNAC-N2 devices is: | |
| "\n/bin/sh" | |
| *Note:* The quotes and the leading newline meta-character | |
| are essential tor the exploit to succeed. | |
| --- | |
| Mitrastar GPT-2741GNAC-N2 devices are provided with access through | |
| ssh into a restricted default shell. This is called the "support" | |
| user and the credential to log in is a sticker on the router as | |
| provided by Vivo (Telefonica Brasil) on their Vivo Fibra offer. | |
| The command "deviceinfo show file" is supposed to be used from | |
| restricted shell to show files and directories. By providing | |
| "\n/bin/sh" (quotes included, note the newline special character) | |
| to the argument of this command will drop a root shell. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment