Сама статья с полным разбором
Usage of PoC:
Open reverse mipsle shell in Metasploit with your LHOST, LPORT variables, change variables in PoC exploit file(ATTACKER IP, URL, USERNAME and PASSWORD if you must).
PoC(just change extension to .py):
Usage of PoC:
Open reverse mipsle shell in Metasploit with your LHOST, LPORT variables, change variables in PoC exploit file(ATTACKER IP, URL, USERNAME and PASSWORD if you must).
PoC(just change extension to .py):