Analysis blog of a 0-day vulnerability that has no CVE ID assigned to it
publishScreenshots from the blog posts
Summary
In this post, we will exploit TBK digital video recording (DVR) devices to get command execution on the machine. We will learn how to exploit such devices and how to go about gaining a session on that machine.
general
Description
Tags
Comments (0)