Reverse engineering of Mikrotik exploit from Vault 7 CIA Leaks
Working PoC (Full Sources) and Chimay Red Persistence Exploit - PDF Article
Working PoC (Full Sources) and Chimay Red Persistence Exploit - PDF Article