Skip to content

Walla -- Proving Grounds (write-up)

Difficulty: Intermediate Box: Walla (Proving Grounds) Author: dsec Date: 2025-11-11


TL;DR

RaspAP on port 8091 with default credentials. CVE-2020-24572 RCE for shell. Privesc via wifi controller module exploit.


Target info

  • Host: Walla (Proving Grounds)
  • Services discovered: 8091/tcp (RaspAP)

Enumeration

Nmap results

Service details

Port 8091 -- RaspAP with default credentials:

  • admin:secret

Foothold

RaspAP login

CVE-2020-24572 RCE exploit:

  • https://github.com/gerbsec/CVE-2020-24572-POC

Exploit setup

Exploit execution


Privilege escalation

Privesc enum

Exploited the wifi controller module:

Root


Lessons & takeaways

  • Always check for default credentials on IoT/network management interfaces
  • RaspAP has known RCE vulnerabilities
  • Wifi controller modules running with elevated privileges can be abused for privesc