[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Reaver WiFi Protected Setup Exploit
# Published : 2011-12-30
# Author :
# Previous Title : Apache mod_proxy Reverse Proxy Exposure Vulnerability PoC
# Next Title : Mozilla Firefox 3.6.16 mChannel use after free vulnerability


# Exploit Title: Reaver WiFi Protected Setup Exploit
# Google Dork:
# Date: 28 December 2011
# Author: cheffner@tacnetsol.com
# Software Link: http://www.tacnetsol.com/products/
# Version: All 802.11 access points implementing WiFi Protected Setup and have it enabled.
# Tested on: Access points from Linksys, Cisco, D-Link, TP-Link, Trendnet, and others
# CVE : No CVE US-CERT VU#723755

http://www.exploit-db.com/sploits/reaver-1.1.tar.gz