Linksys E1200(V2)
Project started on 4 Dec 2025


1. Resources
2. Learning outcomes
OSINT techniques to gather information on a hardware without physical access to the device itself
Google dork
Known CVEs (CVE-2025-60690, CVE-2025-60691, etc.)
FCC
Internal photos
Identifying presence of UART interfaces
Other useful information
Firmware download
End-of-Life (EoL) and End-of-Support (EoS) dates
Release notes
Hardware interactions & UART shell
Identifying potential UART and GND points (visual inspection)
Using the digital multimeter:
Identify GND points
Identify specific UART pins
Gaining a shell console
Interacting with basic networking services on the device
DHCP
Nmap scan
cURL, Netcat, etc.
System enumeration
Boot logs (UART console)
Firmware and OS versions, along with other useful information
Techniques to interact with the device
Simple techniques to reclaim memory space on the device
Transfer files between device and host
Provide additional access to the shell (dropbear SSH server)
Research of a vulnerable binary (CVE-2025-60690)
Understand the vulnerability from the CVE description
Perform source code and HTTP traffic analysis
Perform fuzzing, and analysis of the results to aid us in finding the entry point of the vulnerability
Understand constraints and limitations of working with embedded devices, and explore workarounds to develop a working setup for reverse engineering + binary exploitation
Patch the binary with custom "breakpoint" instructions to control the program flow
Manual SIGSTOP signal to force a "pause"
Understand the MIPS architecture & assembly
Work with exploit tools and techniques: pwn, Ghidra, GDB + gdbserver, objdump, etc.
Utilize our understanding of the MIPS architecture/assembly to analyse register, memory contents, and many more important concepts
Reverse engineering and stack-based buffer overflow research
Demonstration of the steps taken to craft an initial payload to overwrite the return address and invoke a denial-of-service (DoS)
Utilize GDB to analyse the crash, and build towards our final RCE payload
Craft the final working RCE payload (CVE-2025-60690)
Understand common roadblocks such as stack layout constraints and bad characters, and how we can overcome these challenges with creative workarounds
Craft the final payload to escalate the controlled-crash into Remote-Code Execution (RCE)
Overall hands on experience working with well-known industry-standard application and tools that covers a wide range of tasks in a typical pentesting workflow
Network: nmap, netcat, cURL,wget, Wireshark, etc.
Reversing + binary exploitation: Ghidra, gdb/gdbserver, dd, etc.
Bonus section: post-exploitation + persistence techniques from a real-world perspective
...
Last updated