Other languages:
by injecting commands into the wifi channel config
This exploit requires opening the "Files" page of the card's web interface and escaping to the root of the file system.
function Bucket(capacity, level){ | |
this.capacity = capacity; | |
this.level = level || 0; | |
} | |
Bucket.prototype.fill = function(){ | |
this.level = this.capacity; | |
} | |
Bucket.prototype.discard = function(){ | |
this.level = 0; | |
} |
Other languages:
by injecting commands into the wifi channel config
This exploit requires opening the "Files" page of the card's web interface and escaping to the root of the file system.
I hereby claim:
To claim this, I am signing this object: