This exploit leverages a command injection vulnerability in LaCie 5big Network 2.2.8 to execute arbitrary commands with root privileges. It sends a crafted payload via a CGI endpoint to trigger a reverse shell connection to an attacker-controlled IP and port.
Classification
Working Poc 100%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:LaCie 5big Network 2.2.8
No auth needed
Prerequisites:Network access to the target device · A listener (e.g., netcat) set up on the specified IP and port