Exploit research
1. Initial findings
1.1 file
$ file httpd
httpd: ELF 32-bit LSB executable, MIPS, MIPS32 version 1 (SYSV), dynamically linked, interpreter /lib/ld-uClibc.so.0, stripped1.2 checksec
$ pwn checksec httpd
Arch: mips-32-little
RELRO: No RELRO
Stack: No canary found
NX: NX disabled
PIE: No PIE (0x400000)
RWX: Has RWX segments1.3 Runtime analysis
1.3 objdump
2. GDB, gdbserver
2.1 Retrieve gdbserver for the target's architecture
gdbserver for the target's architecture2.2 gdbserver on target router
gdbserver on target router2.3 Connect to remote target from host machine
2.4 Memory address enumeration (httpd)
httpd)
3. Enumeration
3.1 Ghidra


3.2 Fuzzing
3.3 index.asp
index.asp3.4.1 Extract information
3.4.2 Identifying form identifier locations
3.4.3 Interesting code locations of document.setup
document.setup 3.4.4 Identifying form action handler(s)
3.4 Web page (port 80) traffic analysis
3.4.1 Manually send form request from the webpage

4. Setting custom breakpoints on a binary (workaround)
4.1 Binary patching
4.2 Manual SIGSTOP signal to halt the running process (gdb)
gdb)Last updated