{"uuid": "ad2c0698-7a0e-4f0f-be70-29d41e47176a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15048", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1764", "content": "#Red_Team_Tactics\n1. Bypassing Flash Encryption by leveraging a design weakness (CVE-2020-15048) in combination with EMFI\nhttps://raelize.com/posts/espressif-systems-esp32-bypassing-flash-encryption\n2. Run as SYSTEM using Evil-WinRM\nhttps://malicious.link/post/2020/run-as-system-using-evil-winrm", "creation_timestamp": "2024-05-08T02:57:25.000000Z"}