header-logo
Suggest Exploit
vendor:
WebServer powered by goahead WEBSERVER
by:
NeoCoderz
N/A
CVSS
N/A
FS4104-AW - Full-Service VDSL Device
CWE
Product Name: WebServer powered by goahead WEBSERVER
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Unknown
2007

WebServer powered by goahead WEBSERVER

The exploit can be accessed through http://[ip]/goform/QuickStart_c0. It allows for source code and password disclosure on 'Input typepassword'.

Mitigation:

Unknown
Source

Exploit-DB raw data:

--------------------------------------------------------------------------------

# WebServer powered by goahead WEBSERVER

# Vulnerability on : FS4104-AW - Full-Service VDSL Device

# exemple : IP : 81.240.1.1 to 81.240.1.254 / port : 80

# exploit : =>http://[ip]/goform/QuickStart_c0
            =>source
            =>password disclosure on 'Input typepassword'

# verification on www.skynet.be

# Vulnerability Found By NeoCoderz

# mail:NeoCoderz1@msn.com
                            fReNcH HaCkInG Is NoT dEaD ...
                                      eNjoY iT ....
---------------------------------------------------------------------------------

# milw0rm.com [2007-12-18]