Rooted!
Foothold: Google how the endpoint works and understand how can you exploit
User: recover all informations, but pay attention why something is not working (recall the main theme of the box). Enumerate enumerate enumerate.
Root: at this point is downhill with the usual approach, a couple of tricks to pay attention and you’ll get root shell.
Thanks for the box!