ping!
A purposefully undefended system (can you guess why?) and a decades old attack vector yields root.
Shocking, shocking!
The linked article is most interesting.
It seems like TDLS has to be carefully implemented. The standard put in all sorts of checks to make sure the devices establishing a TDLS connection were on the same network, but it seems like this vendor left in code that allows send a tunneled probe request without even having a TDLS connection. That was probably for convenience in debugging, but when you move something to production you’re supposed to take these hooks out.
Looking at the overall architecture described in the article, it looks pretty much like a kludge. They probably had multiple programmers working on it, and had to allow executable code in the stack to maintain memory-management discipline among the team.
They keep writing programs and writing programs and never get it quite right. Let’s hope the people who write programs for what is called “artificial intelligence “ have more talent than that.
I haven’t a clue what any of that means——but I have an IPod.
Oh well.
.
Forbes says take a deep breath everyone, this is a minor point upgrade and unless you work in a high security environment you can wait 24 to 48 hours for the dust to settle.