iftop 1.17 and the privilege to capture on some device (specify with
-i if needed) .
It can be used to break out from restricted environments by spawning an interactive system shell.
It runs in privileged context and may be used to access the file system, escalate or maintain access with elevated privileges if enabled on
sudo iftop !/bin/sh
It runs with the SUID bit set and may be exploited to access the file system, escalate or maintain access with elevated privileges working as a SUID backdoor. If it is used to run commands it only works on systems like Debian (<= Stretch) that allow the default
sh shell to run with SUID privileges.
sudo sh -c 'cp $(which iftop) .; chmod +s ./iftop' ./iftop !/bin/sh