This Metasploit module takes advantage of a poorly configured TACACS+ config, Arista’s bash shell, and a TACACS+ read-only account to achieve privilege escalation.
This Metasploit module takes advantage of a poorly configured TACACS+ config, Arista’s bash shell, and a TACACS+ read-only account to achieve privilege escalation.