Member-only story

💰 $9,060 OS Command Injection — Private Bug Bounty P1 | 2023

Krish_cyber
2 min read6 days ago

--

🔥 The Thrill of Finding a P1 Bug

Every bug bounty hunter dreams of that one big find — the kind that lands you in the P1 category with a massive payout. Well, this was one of those moments! A single OS command injection vulnerability in a private bug bounty program scored me a $9,060 reward. Here’s the full breakdown.

🎯 Target & Scope

The target was a network device running custom firmware. Since it handled critical operations, any security flaw could mean serious real-world consequences. My goal? Find a way to inject system commands and gain control.

🔍 How I Discovered the Vulnerability

During testing, I noticed a parameter accepting user input but failing to sanitize it properly. This immediately raised a red flag đźš©.

I started testing with basic payloads:

; ls -la

Surprisingly, I got a directory listing — meaning my input was being executed directly on the system!

From here, I escalated my attack

; whoami; uname -a; cat /etc/passwd

đź’Ą BOOM! The system spilled sensitive information, confirming remote command execution (RCE).

🚀 Impact & Exploitation

--

--

Krish_cyber
Krish_cyber

Written by Krish_cyber

hii I'm krishna passionate cybersecurity enthusiast and aspiring bug bounty hunter, dedicated to ethical hacking and securing digital system.

No responses yet