Haystack

Finally Rooted!!!

Thanks to @geordish @cof123 @“Nick | Int” for the root part and few other players, in fact too many of them i cant list it all out. But thank you, enjoyed the time when we worked together across different timezones.

Hints:
User: google translate is your friend, but dont rely it too much, sometimes you do not need it. This part is like CTF ish, so go ahead to process the image, unload the hint and use bit of brain power on the hint.

Root: there are 2 more steps to root after you gain access to the user part. The CVE is not really the CVE exploitable thing, it just tells you the vulnerability, go back to square one if needed and to regain access to the server. Once success, look for some build in features that cause the vulnerability and keep testing it, if necessary, use some online debugger tools to debug it, it can save you some great amount of time.

Good Luck!