vendor:
Wireless G router + adsl2 modem
by:
Unknown
8.8
CVSS
HIGH
Bypassing webinterface password protection
287
CWE
Product Name: Wireless G router + adsl2 modem
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: None
CPE: None
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unknown
Unknown
html code to bypass the webinterface password protection of the Belkin wireless G router + adsl2 modem
This exploit allows an attacker to bypass the webinterface password protection of the Belkin wireless G router + adsl2 modem. It works by submitting a form with malicious values to the router's CGI script. This exploit was tested on model F5D7632-4V6 with upgraded firmware 6.01.08.
Mitigation:
Ensure that the router is running the latest firmware version and that the webinterface password is strong and unique.