Tim (Wadhwa-)Brown :donor:<p>Technically, it's not a vuln because if you enable SSH via the supported route then you only get a root shell and there's no way to create low priv'd SSH users, but since there's no ability to persistently fix that issue, I ended up abusing IPC to write to the persistent storage a scheduled job which will give me a low priv'd SSH user 🤡.</p><p><a href="https://gist.github.com/timb-machine/a3b2d27adcbbed34455e78f845198392" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/timb-machine/a</span><span class="invisible">3b2d27adcbbed34455e78f845198392</span></a></p><p>It just so happens that /if/ you did have a low priv'd SSH user, then the IPC would enable you to get root.</p><p><a href="https://infosec.exchange/tags/westerndigital" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>westerndigital</span></a>, <a href="https://infosec.exchange/tags/mycloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mycloud</span></a>, <a href="https://infosec.exchange/tags/y0day" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>y0day</span></a>, <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a>, <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>