devttys0.com/2014/05/hacking-the-dsp-w215-again-again

Here we go again...again. In the last DSP-W215 exploit, I mentioned that the exploit's POST parameter name had to be storage_path in order to prevent the get_input_entries function from crashing prematurely


Comments (0)

Sign in to post comments.