Other languages:
by injecting commands into the wifi channel config
This exploit requires opening the "Files" page of the card's web interface and escaping to the root of the file system.
| beforeEach(function () { | |
| jasmine.Matchers = {prototype: {}}; | |
| jasmine.Env = {prototype: {}}; | |
| require('promise-matchers'); | |
| Object.keys(jasmine.Matchers.prototype).forEach(function(key) { | |
| var matcher = jasmine.Matchers.prototype[key]; | |
| jasmine.Matchers.prototype[key] = function() { | |
| return { | |
| compare: function(actual, done, expected) { |
| 10:05:47.619 INFO - Executing: [new session: Capabilities [{browserName=firefox}]]) | |
| 10:05:47.620 INFO - Creating a new session for Capabilities [{browserName=firefox}] | |
| org.openqa.selenium.firefox.NotConnectedException: Unable to connect to host localhost.localdomain on port 7055 after 45000 ms. Firefox console output: | |
| Xlib: extension "RANDR" missing on display ":99". | |
| process 6144: D-Bus library appears to be incorrectly set up; failed to read machine uuid: Failed to open "/var/lib/dbus/machine-id": No such file or directory | |
| See the manual page for dbus-uuidgen to correct this issue. | |
| D-Bus not built with -rdynamic so unable to print a backtrace | |
| Redirecting call to abort() to mozalloc_abort | |
| function Bucket(capacity, level){ | |
| this.capacity = capacity; | |
| this.level = level || 0; | |
| } | |
| Bucket.prototype.fill = function(){ | |
| this.level = this.capacity; | |
| } | |
| Bucket.prototype.discard = function(){ | |
| this.level = 0; | |
| } |
Other languages:
by injecting commands into the wifi channel config
This exploit requires opening the "Files" page of the card's web interface and escaping to the root of the file system.
I hereby claim:
To claim this, I am signing this object: