exploit the possibilities
Showing 1 - 25 of 100 RSS Feed

Files

Seowon 130-SLC 1.0.11 Remote Code Execution
Posted Nov 24, 2020
Authored by maj0rmil4d

Seowon 130-SLC router version 1.0.11 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | bfa4fe4c759168816c3ca278f138bd2d

Related Files

Alpha Networks ADSL2/2+ Wireless Router ASL-26555 Password Disclosure
Posted Aug 17, 2012
Authored by Alberto Ortega

Alpha Networks ADSL2/2+ Wireless Router version ASL-26555 suffers from a remote administration password disclosure vulnerability. Tested on firmware version 2.0.0.30B_ES.

tags | exploit, remote
MD5 | 41d837a1e0492f1e2f9760db395e5d70
Cisco Security Advisory 20120530-iosxr-2
Posted Aug 15, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP-4G and RSP-8G), Route Switch Processor 440 (RSP440), and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.

tags | advisory, denial of service
systems | cisco, osx
MD5 | 26362bf2982313cf5fcbee13db6c32b8
Thrip Port Scanner
Posted Aug 4, 2012
Authored by grell64

This is a multithreaded scanner that scans many ip addresses on a specified port simultaneously. It is very useful for finding insecure systems when used with such ports as 23 (Telnet) or 8080, which is the web interface for many routers. The author of this program takes no responsibility for the actions of its users.

tags | tool, web, scanner
systems | unix
MD5 | 6849da66f62ba48fe968dedbdfefe838
OpenNHRP NBMA Next Hop Resolution 0.13.1
Posted Jun 23, 2012
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: This release adds minor fixes for configurations with multiple mgre interfaces.
tags | encryption, protocol
systems | cisco, linux
MD5 | 4c847b558946b07a446b052cc29eb02a
Secunia Security Advisory 49365
Posted Jun 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 625fea87e6dff0cd5fc04eb258caa728
Neighbor Discovery Shield: Protecting against Neighbor Discovery Attacks
Posted Jun 7, 2012
Authored by Fernando Gont

This document specifies a mechanism that can be implemented in layer-2 devices to mitigate attack vectors based on Neighbor Discovery messages. It is meant to complement other mechanisms implemented in layer-2 devices such as Router Advertisement Guard (RA-Guard) and DHCPv6-Shield, with the goal of achieving a comprehensive IPv6 First Hop Security solution. This document is motivated by the desire to achieve feature parity with IPv4 with respect to First Hop Security mechanisms.

tags | paper
MD5 | 333569f5708db49e25c089f6a7579295
Cisco Security Advisory 20120530-iosxr
Posted May 31, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability when handling crafted packets that may result in a denial of service condition. The vulnerability only exists on Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and Cisco Carrier Routing System (CRS) Performance Route Processor (PRP). The vulnerability is a result of improper handling of crafted packets and could cause the route processor, which processes the packets, to be unable to transmit packets to the fabric. Cisco has released free software updates that address this vulnerability.

tags | advisory, denial of service
systems | cisco, osx
MD5 | afef98e7588e0171291bcdc3ea8f1cc5
Secunia Security Advisory 49145
Posted May 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Belkin N150 Wireless Router, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | ad048e2b02fe910017b2eb6a082f9499
Cisco Linksys WRT54GL Cross Site Request Forgery
Posted May 8, 2012
Authored by Kalashinkov3

The Cisco Linksys WRT54GL router suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
systems | cisco
MD5 | 0e0e434abd68b45eb6dcf24f10de0911
Mikrotik Router Denial Of Service
Posted May 2, 2012
Authored by PoURaN

Mikrotik Router suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | c648f49b6006bde89393f7e023711d1f
Secunia Security Advisory 48840
Posted Apr 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ivano Binetti has reported a vulnerability in Sitecom WLM-2501 Wireless Modem Router 300N, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | df9d02bdc233c90cb077cf2565a44f70
Cisco Security Advisory 20120328-mace
Posted Mar 29, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS Software contains a denial of service (DoS) vulnerability in the Wide Area Application Services (WAAS) Express feature that could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Cisco IOS Software also contains a DoS vulnerability in the Measurement, Aggregation, and Correlation Engine (MACE) feature that could allow an unauthenticated, remote attacker to cause the router to reload. An attacker could exploit these vulnerabilities by sending transit traffic through a router configured with WAAS Express or MACE. Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to cause the router to leak memory or to reload. Repeated exploits could allow a sustained DoS condition. Cisco has released free software updates that address these vulnerabilities.

tags | advisory, remote, denial of service, vulnerability
systems | cisco
advisories | CVE-2012-1312, CVE-2012-1314
MD5 | 572bf3bd1463d3f5f39c3e7cb3451a2d
Firewall Builder With GUI 5.1.0.3599
Posted Mar 29, 2012
Site fwbuilder.org

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Changes: Packages for Windows and Mac OS X are now distributed under the GPL, and the source code includes all files necessary to build on Linux, *BSD, Windows, and Mac OS X. This release also includes a few bugfixes in the policy compiler for iptables and for the build problem on Gentoo.
tags | tool, firewall
systems | cisco, linux, unix, openbsd
MD5 | 331ce22eb8fb770a70395c3744f5092f
LotusCMS 3.0 eval() Remote Command Execution
Posted Mar 8, 2012
Authored by Alligator Security Team | Site metasploit.com

This Metasploit module exploits a vulnerability found in Lotus CMS 3.0's Router() function. This is done by embedding PHP code in the 'page' parameter, which will be passed to a eval call, therefore allowing remote code execution. The module can either automatically pick up a 'page' parameter from the default page, or manually specify one in the URI option.

tags | exploit, remote, php, code execution
advisories | OSVDB-75095
MD5 | 100bde8dcb180988fb131d330903d7bc
STKeyGen BT HomeHub 2 Type A Credential Generator
Posted Mar 2, 2012
Authored by Kevin Devine, James Hall

STKeyGen demonstrates how default WPA keys and default Administrator passwords are created on BT HomeHub 2 Type A router in the UK which are based on Technicolor/Thomson hardware.

tags | tool, wireless
systems | unix
MD5 | 12bbaab39378637c8b5c35e34a520f45
D-Link DSL-2640B Authentication Bypass
Posted Feb 23, 2012
Authored by Ivano Binetti

The D-Link DSL-2640B ADSL router suffers from a simple authentication bypass vulnerability by spoofing the MAC address of a logged in administrator.

tags | exploit, spoof, bypass
MD5 | 3851cd4f4e001875aa05cb0f9955a4d4
Mercurycom MR804 Router Denial Of Service
Posted Feb 22, 2012
Authored by demonalex

Mercurycom MR804 Router version 3.8.1 Build 101220 Rel.53006nB suffers from a denial of service vulnerability when fed multiple HTTP headers.

tags | exploit, web, denial of service
MD5 | ccff62db643c371d665060ad46a55c72
Cisco Linksys WAG54GS Cross Site Request Forgery
Posted Feb 22, 2012
Authored by Ivano Binetti

The Cisco Linksys WAG54GS ADSL router suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
systems | cisco
MD5 | 09281365d9ad97398e761ef6ef5a3f31
Xavi 7968 ADSL Router Cross Site Request Forgery / Cross Site Scripting
Posted Feb 21, 2012
Authored by Busindre

The Xavi 7968 router suffers from cross site request forgery and persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 7171faa7046bce2921b5676cd357923d
Xavi 7968 ADSL Router Denial Of Service
Posted Feb 21, 2012
Authored by Busindre

The Xavi 7968 ADSL router suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
MD5 | 75c0248c2d5c3dec217730c345140bb0
D-Link DSL-2640B Cross Site Request Forgery
Posted Feb 19, 2012
Authored by Ivano Binetti

The D-Link DSL-2640B ADSL router suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 891e7de6bdded1a357845afd07c04553
Lightidra IRC Router Scanner
Posted Jan 30, 2012
Authored by eurialo | Site ahacktivia.org

Lightaidra is an IRC commanded tool that allows for scanning and exploiting routers. It also performs flooding.

tags | tool, scanner
systems | unix
MD5 | a5192e2428d901e1f57b9b5d16671073
RouterDefense 2012_1
Posted Jan 23, 2012
Authored by Francois Ropert | Site code.google.com

RouterDefense is a Cisco IOS security assessment tool. It deep dives into router and switch configurations and reports security recommendations.

systems | cisco, unix
MD5 | 8964f2e543c17b37beed64cb415b66ce
Avaya WinPDM UniteHostRouter 3.8.2 Buffer Overflow
Posted Jan 20, 2012
Authored by Abysssec | Site abysssec.com

Avaya WinPDM UniteHostRouter versions 3.8.2 and below remote pre-auth buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
MD5 | 2f0e85ab508a09e0ebb1db87894629ab
Security Implications Of IPv6 Extensions Headers With Neighbor Discovery Rev 2
Posted Jan 13, 2012
Authored by Fernando Gont | Site ietf.org

IPv6 Extension Headers with Neighbor Discovery messages can be leveraged to circumvent simple local network protections, such as "Router Advertisement Guard". Since there is no legitimate use for IPv6 Extension Headers in Neighbor Discovery messages, and such use greatly complicates network monitoring and simple security mitigations such as RA-Guard, this document proposes that hosts silently ignore Neighbor Discovery messages that use IPv6 Extension Headers. Revision 2 of this document. This revision includes, among other things, a discussion of possible issues with SEND as a result of IPv6 fragmentation.

tags | paper, local
MD5 | bddd807b8490984a05656623cd777ccd
Page 1 of 4
Back1234Next

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close