The document describes multiple web vulnerabilities in WiFly 1.0 Pro iOS, including local file include and arbitrary file upload via manipulated filenames in POST requests. Exploitation requires no user interaction but needs the target device to accept the connection.
Classification
Writeup 90%
Attack Type
Other
Complexity
Moderate
Reliability
Theoretical
Target:WiFly Pro 1.0 (iOS)
No auth needed
Prerequisites:Target device must accept the connection · Access to the local network