Skip to content

Instantly share code, notes, and snippets.

@garoto
Forked from geraldog/CVE-2025-50753.txt
Created October 1, 2025 21:27
Show Gist options
  • Select an option

  • Save garoto/f741b889c0b0786431fdc384ea7a0582 to your computer and use it in GitHub Desktop.

Select an option

Save garoto/f741b889c0b0786431fdc384ea7a0582 to your computer and use it in GitHub Desktop.
CVE-2025-50753 - Mitrastar GPT-2741 GNAC-N2 root privilege escalation
## Correction Notice: CVE-2025-50753 Exploit Method
**Important:** The CVE description incorrectly omits
the required newline character.
The correct command argument to gain root access on
Mitrastar GPT-2741 GNAC-N2 devices is:
"\n/bin/sh"
*Note:* The quotes and the leading newline meta-character
are essential tor the exploit to succeed.
---
Mitrastar GPT-2741GNAC-N2 devices are provided with access through
ssh into a restricted default shell. This is called the "support"
user and the credential to log in is a sticker on the router as
provided by Vivo (Telefonica Brasil) on their Vivo Fibra offer.
The command "deviceinfo show file" is supposed to be used from
restricted shell to show files and directories. By providing
"\n/bin/sh" (quotes included, note the newline special character)
to the argument of this command will drop a root shell.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment