Step 1: Vulnerability Trigger: The fte-console application is running on the system, likely as part of the system's boot process or as a service. It is running with root privileges.
Step 2: Accessing the Virtual Console: The attacker interacts with the virtual console device, which is managed by fte-console. This interaction could involve sending specific commands or data to the device.
Step 3: Command Injection: The attacker crafts a malicious command or payload designed to be executed with root privileges. This payload is injected through the virtual console device.
Step 4: Privilege Escalation: Because fte-console is running with root privileges and hasn't dropped them, the injected command is executed with root privileges.
Step 5: System Compromise: The attacker's malicious command executes, granting them root access and complete control over the system.