SNMP enumeration to find credentials to gain a shell, which we then route to find Pandora CMS, which wa vulnerable to SQLi, to gain foothold. For root, $PATH was exploited.
Connect via IPSEC VPN to get access to the host, clues from SNMP to get connected, found out its a Windows host, uploaded a webshell via FTP, then privesc with JuicyPotato.