ID PACKETSTORM:80447 Type packetstorm Reporter SuNHouSe2 Modified 2009-08-18T00:00:00
Description
`-----------------------------------------------------
-->> Found By SuNHouSe2 [ALGERIAN HaCkEr] <<--
--> Made in "Maghnia City" (DZ) <--
--> Contact : sunhouse2@yahoo.com <--
--> Greetz to : His0k4 all my friends <--
--> Good Ramadan to all muslims <--
-----------------------------------------------------
Exploit tested on modem with this informations :
ZTE CORPORATION
Date : NOV 2008
Product : ADSL Modem
Model : ZXDSL 831 II --> http://www.geeksecurity.org/tsttte.JPG
Firmware Version : ZXDSL 831IIV7.5.0a_E09_OV
-----------------------------------------------------
Introduction:
This modem is used by many providers in the world like
russia india and algeria [used by provider and all clients of "Easy ADSL"].
Exploit :
We can get access to to configuration of the modem , and get PPPOE user & password.
Go only here
http://192.168.1.1/vpivci.cgi
A video uploaded to explain how we can use this exploit to get PPPOE sessions
with user & password
download video demonstration >
http://www.geeksecurity.org/vid/zxdsl-exploit-2.rar
------------------------------------------------------
`
{"hash": "8f36f4c893bd71a3b8aa73331b854f00f219beade14cbfe6767c8fea5709134f", "sourceHref": "https://packetstormsecurity.com/files/download/80447/zte-bypass.txt", "title": "ZTE XSDSL 831 II Configuration Access", "id": "PACKETSTORM:80447", "published": "2009-08-18T00:00:00", "description": "", "modified": "2009-08-18T00:00:00", "sourceData": "`----------------------------------------------------- \n-->> Found By SuNHouSe2 [ALGERIAN HaCkEr] <<-- \n--> Made in \"Maghnia City\" (DZ) <-- \n--> Contact : sunhouse2@yahoo.com <-- \n--> Greetz to : His0k4 all my friends <-- \n--> Good Ramadan to all muslims <-- \n----------------------------------------------------- \n \nExploit tested on modem with this informations : \n \nZTE CORPORATION \n \nDate : NOV 2008 \nProduct : ADSL Modem \nModel : ZXDSL 831 II --> http://www.geeksecurity.org/tsttte.JPG \nFirmware Version : ZXDSL 831IIV7.5.0a_E09_OV \n \n----------------------------------------------------- \nIntroduction: \n \nThis modem is used by many providers in the world like \nrussia india and algeria [used by provider and all clients of \"Easy ADSL\"]. \n \nExploit : \nWe can get access to to configuration of the modem , and get PPPOE user & password. \n \nGo only here \nhttp://192.168.1.1/vpivci.cgi \n \nA video uploaded to explain how we can use this exploit to get PPPOE sessions \nwith user & password \n \ndownload video demonstration > \n \nhttp://www.geeksecurity.org/vid/zxdsl-exploit-2.rar \n \n------------------------------------------------------ \n \n \n`\n", "reporter": "SuNHouSe2", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "0d18ad308b152f001988be8dad203c11"}, {"key": "modified", "hash": "c8178b7704298f9cbb7b59f0b8404099"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "c8178b7704298f9cbb7b59f0b8404099"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "ca0d80acb43a465a78ea7290255951c2"}, {"key": "sourceData", "hash": "93c0211f80b3717756a6c3452603899f"}, {"key": "sourceHref", "hash": "bbaee44ce82f484f863546bd8e06c80f"}, {"key": "title", "hash": "0ba694f46b55217af3eedb93acf166e6"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "cvss": {"vector": "NONE", "score": 0.0}, "references": [], "type": "packetstorm", "cvelist": [], "history": [], "bulletinFamily": "exploit", "objectVersion": "1.2", "edition": 1, "href": "https://packetstormsecurity.com/files/80447/ZTE-XSDSL-831-II-Configuration-Access.html", "lastseen": "2016-11-03T10:19:56", "viewCount": 0, "enchantments": {"vulnersScore": 2.8}}