GitHub - hacker30468/Mikrotik-router-hack: This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed,
![Uncovering Trickbot's use of IoT devices in command-and-control infrastructure | Microsoft Security Blog Uncovering Trickbot's use of IoT devices in command-and-control infrastructure | Microsoft Security Blog](https://www.microsoft.com/en-us/security/blog/wp-content/uploads/2022/03/trickbot-mikrotik-image-social.png)
Uncovering Trickbot's use of IoT devices in command-and-control infrastructure | Microsoft Security Blog
![Amazon.com: MikroTik hAP AC RouterBoard, Triple Chain Access Point 802.11ac (RB962UiGS-5HacT2HnT-US) : Electronics Amazon.com: MikroTik hAP AC RouterBoard, Triple Chain Access Point 802.11ac (RB962UiGS-5HacT2HnT-US) : Electronics](https://m.media-amazon.com/images/I/41m5-z19P9L._AC_.jpg)
Amazon.com: MikroTik hAP AC RouterBoard, Triple Chain Access Point 802.11ac (RB962UiGS-5HacT2HnT-US) : Electronics
![hackerfantastic.crypto on Twitter: "Here is "@mikrotik_com RouterOS <= 6.43.7 post-authentication local root arbitrary file creation #0day." On versions prior to 6.40 this can be used to trivially jailbreak a RouterOS device - hackerfantastic.crypto on Twitter: "Here is "@mikrotik_com RouterOS <= 6.43.7 post-authentication local root arbitrary file creation #0day." On versions prior to 6.40 this can be used to trivially jailbreak a RouterOS device -](https://pbs.twimg.com/media/DuJqpu-W0AAI1fk.jpg)