Your "free k3" offer diverted my attention from touch and k4nt. Now I have been looking for exploits in the k3.
The tar bug STILL does not work on the k3 (just like last time I tested it). I found a possible LD_LIBRARY_PATH exploit though. That means payload must be packaged in a .so lib file though. Hard to believe they would try to load native EXECUTABLE code off the user partition, but it sure looks like it though...
Last edited by geekmaster; 01-08-2012 at 08:40 PM.
|