The Escalte Plowman tool
(https://github.com/dreilly369/EQGRP-Auction-Files/tree/master/Firewall/EXPLOITS/ESPL)
is a parameterized dropper (or a privelege escalation exploit) against WatchGuard firewalls (and likely a few others) of unknown versions. It injects code via the
ifconfig
command. It uses FTP, TFTP, or HTTP (via wget) for the download portions.
The code makes some assumptions about the environment. For instance,
when using the TFTP protocol it assumes the existence of a custom
tftp client located at the hard-coded location
/usr/rapidstream/bin/tftp. The sample also makes the assumption of
the interface being eth0.