D-Link DCS Series cross site request forgery proof of concept exploit that changes the administrative password.
f87043c8b0337b923a27ab33b7cd3afaddb37c82e480326ebf22682dff298efa
This shellcode writes down your code in the end of found files. Your code will be added only .html and .php files. Search for files is carried out recursively.
8c618ade2e8e0d28c057139097aaa69a682f6fa5ffedd4dac01f8f3adfba7245
AirTies-4450 suffers from an unauthorized remote reboot vulnerability.
24bbd158e500893c476af676d155912d8555eac877171d84f569ef369e19dde1
168 bytes small Linux/MIPS connect back shellcode (port 0x7a69).
7b43e0e64b03373c5dc3efce8c1971e7c95efb2bdaa8e86727fdd6efb2eeef69
32 bytes small Linux/MIPS reboot() shellcode.
183e93a0cbcf7f38eca82dd786eb1bbfae126f2e12296d84c69378b77586848c
ShareCenter D-Link DNS-32- remote reboot/shutdown/reset denial of service exploit.
c0fae690833217b6caeee7764101bc2567c68446ccbd6782a98f3549776d6aab
48 bytes small Linux/MIPS execve /bin/sh shellcode.
e05b3f3d11e44fb1f0249c1ab2224ecc1c315978a8021004d63803a15a770b0e
164 bytes small Linux/MIPS add user (UID 0) with password shellcode.
33fe89705d37ee6fd02b2cee2201f40340d0f78902c3d725866581684affd745