Results 1 to 6 of 6
  1. #1
    Bad Street Fighter Ryu's Avatar
    Join Date
    Nov 2014
    Location
    Acquiring Signal
    Posts
    4,525
    Rep Power
    299

    code injection exploit on informir boxes

    switch to dreamlink, formuler or read below

    Code:
    https://research.checkpoint.com/we-decide-what-you-see-remote-code-execution-on-a-major-iptv-platform/
    All information provided is for informational purposes only. Use at your own risk.

  2. #2
    Banned
    Join Date
    Nov 2017
    Location
    in front of pc
    Posts
    2,074
    Rep Power
    0
    I'll stick to using buzz

  3. #3
    Pinball Wizard
    Join Date
    Nov 2014
    Location
    yes
    Posts
    9,529
    Rep Power
    293
    great info, thanks RYU!!

  4. #4
    Bad Street Fighter Ryu's Avatar
    Join Date
    Nov 2014
    Location
    Acquiring Signal
    Posts
    4,525
    Rep Power
    299
    thanks Laser
    All information provided is for informational purposes only. Use at your own risk.

  5. #5
    Diplomatic Emissary zaang83's Avatar
    Join Date
    May 2019
    Location
    yes i do
    Posts
    780
    Rep Power
    70
    LOL! Good info, thanks Ryu! !

  6. #6
    TV Addicted
    Join Date
    May 2015
    Location
    yes i do
    Posts
    85
    Rep Power
    21
    While it is not possible to know the exact number of those potentially exposed, Check Point Research discerned there to be over 1000 providers of this service with quite likely very high numbers of worldwide customers. As this vulnerability has been patched, we can now reveal what was involved.
    Thats what they think and its not just this service!




    there are SQL dumpers available to the public solving this task.
    The `getAllVideoTasks` function executes an SQL query:

 

 

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •