A bug bounty hunter shares a humbling 30-day experience chasing a $40,000 Critical RCE on an AXIS camera, only to discover the vulnerability was a false positive caused by a fundamental bash shell quoting mistake. Using double quotes in a curl command caused the payload to execute locally on Kali Linux rather than on the target

โ€ข11m read timeโ€ขFrom infosecwriteups.com
Post cover image
Table of contents
A bug hunterโ€™s honest account of discovery, forensic investigation, escalations, and the painful lesson that changed my approach forever.๐ŸŽฏ Introduction๐Ÿ” The Discovery โ€” September 26, 2025๐Ÿ“ค The Submission โ€” $40,000 Potential Bountyโฐ The Waiting Game โ€” Days 1โ€“6๐Ÿ”ฌ The Forensic Investigation โ€” Where Things Got InterestingFinding #1: October 3, 13:39 TimestampFinding #2: mod_evasive DeploymentFinding #3: CGI Script Ageโš”๏ธ The Battle โ€” Escalations, Arguments, and Evidence๐Ÿ’€ The Moment Everything ChangedScreenshot 1: Authentication PromptScreenshot 2: Python Execution Test๐ŸŽ“ The Critical Lesson โ€” Shell QuotingThe Problem: Double QuotesThe Solution: Single QuotesThe Definitive Verification Test๐Ÿ”ฎ What Really Happened in My VideoGet Hacker MD โ€™s stories in your inboxWhat the October 3 Evidence Actually Showed๐Ÿ’ก Lessons Learned (Read These Carefully)Lesson 1: Shell Quoting Is CriticalLesson 2: Use File Creation for Definitive ProofLesson 3: Authentication Prompts Are Red FlagsLesson 4: Test Locally FirstLesson 5: Correlation โ‰  CausationLesson 6: Accept Expert Corrections GracefullyWhat Iโ€™d Do DifferentlyThe Silver LiningResources That Would Have Helped MeConclusion

Sort: