“Because it’s not a patch,” she said. “It’s a possession.”
“Why not?”
ME-8.5.182.0#
That was normal. What wasn’t normal was the second line.
System will reload in 10 seconds.
Maya yanked the Ethernet cable. The AP switched to its battery-backed RAM, still broadcasting. She sprinted to the IDF closet, grabbed the console cable, and brute-forced the bootloader. flash_init . dir flash: . There it was. The file wasn't just installed—it had duplicated. Dozens of hidden files with names like .air-ap2800-k9-me-8-5-182-0.tar.part , each one timestamped from the 1970s.
It was trying to clone itself.
She ran a packet capture. The source MAC address was correct for the AP. But the destination... it was multicasting to a range she’d never seen: ff-ff-ff-ff-ff-ff . Every packet carried a single payload: a binary translation of the TAR file’s own header.
Her fingers flew across the keyboard. show version . The firmware read 8.5.182.0. But the serial number was all zeros. The uptime? Negative forty-seven thousand seconds. Air-ap2800-k9-me-8-5-182-0.tar
She SSH’d into the primary controller AP. The prompt blinked back: AP2800# . She ran the archive download command and watched the percentage climb. 12%... 47%... 89%. When it hit 100%, she initiated the reboot.