Feixun vro unauthorized direct shell
Note: All versions are not kill.
Feixun vro has an unauthorized vulnerability. Once connected to wifi (you can understand this), you can directly view the vro status or even use shell.
-- Taking FWR-601H as an Example
-- This is the main interface after login --
Record the address in the "running status" Framework (http: // 192.168.1.1/status. asp)
Record the addresses in the diagnostic tools framework of System Tools (http: // 192.168.1.1/diagnosis. asp)
Then log out.
-- The following operations are performed when you are not logged on (you can also go to the mobile phone test )--
-Enter the address http: // 192.168.1.1/status. asp in the browser.
You can see the information about the running status of the vro.
-Wonderful. Enter http: // 192.168.1.1/diagnosis. asp in the browser.
Go to the shell page, and then you can do whatever you want.
Let's have a few images!
It proves that shell is available.
-- End --
If you need to change the password, you don't have to repeat it ~
Solution:
You know this.