This exploit demonstrates an SQL column truncation vulnerability in Vikingboard <= 0.2 Beta, allowing an attacker to register as an existing user/admin by appending NULL bytes to the username. The exploit leverages the registration and login endpoints to bypass authentication.
Classification
Working Poc 90%
Attack Type
Auth Bypass
Complexity
Trivial
Reliability
Reliable
Target:Vikingboard <= 0.2 Beta
No auth needed
Prerequisites:Access to the registration and login endpoints