![Running Your App/Service on a Router-Running Your App/Service on a Local Real Device-Running Your App/Service-DevEco Studio User Guide (HarmonyOS)-Tools-HarmonyOSDeveloper Running Your App/Service on a Router-Running Your App/Service on a Local Real Device-Running Your App/Service-DevEco Studio User Guide (HarmonyOS)-Tools-HarmonyOSDeveloper](https://alliance-communityfile-drcn.dbankcdn.com/FileServer/getFile/cmtyPub/011/111/111/0000000000011111111.20221014142024.30107541751118337037626670257059:50531016025945:2800:95E3E2298DF157EEAB46A56A6A0C9415B0A059BF2D495DC9877B9C22AA877A45.png?needInitFileName=true?needInitFileName=true)
Running Your App/Service on a Router-Running Your App/Service on a Local Real Device-Running Your App/Service-DevEco Studio User Guide (HarmonyOS)-Tools-HarmonyOSDeveloper
![RouterOS: Chain to Root. DNS Request to a Root Busybox Shell | by Jacob Baines | Tenable TechBlog | Medium RouterOS: Chain to Root. DNS Request to a Root Busybox Shell | by Jacob Baines | Tenable TechBlog | Medium](https://miro.medium.com/max/1124/1*3Ya0HoOgmxoTnVAkla84cA.png)
RouterOS: Chain to Root. DNS Request to a Root Busybox Shell | by Jacob Baines | Tenable TechBlog | Medium
![Zero Day Initiative on Twitter: "Team Bugscale continues #Pwn2Own #AfterDark with a successful exploit of the LAN interface of the NETGEAR R6700 router. They combined an auth bypass and a command injection Zero Day Initiative on Twitter: "Team Bugscale continues #Pwn2Own #AfterDark with a successful exploit of the LAN interface of the NETGEAR R6700 router. They combined an auth bypass and a command injection](https://pbs.twimg.com/media/FDO4XieX0AQ7Ugq.jpg:large)