0x01 OverviewThe goal of this project is to help people learn about other architectural environments outside of x86_64, while also helping people explore the mysteries of router firmware.So far, the project is based on the installation of Linksys E1550.0x02 InstallationFriendly tips, please back up the router firmware before installation, in case of a rainy future.1 , log in with the Administrator account p
: completelyIntegrity: no impactAvailability: no impactTP-LINK TL-WR842N is a powerful Security Factor of Home Router, test equipment for two, are the same type of the same batch of unseal the latest products.Software Version: 2.3.4 Build 141118 Rel.74025nSuspected version number affected by the WooYun-2015-110062
1. The following test uses a browser to send a r
Release date: 2013-03-21Updated on: 2013-03-22
Affected Systems:TP-LINK TL-WR740N v4.23Description:--------------------------------------------------------------------------------Bugtraq id: 58623The TL-WR740N is a Mbps wireless router.TL-WR740N 3.16.4 Build 130205 Rel.63875n vro has a remote denial of service vulnerability in implementation. If the Web server (httpd) does not process http get requests on the default TCP port 80, the attacker sends a
can burst the physical path of the site.
Figure 1
450) {this.resized=true this.width=450;} "border=0 resized=" true >
Figure 2
450) {this.resized=true this.width=450;} "border=0 resized=" true >
http://127.0.0.1/cblog/include/configs/init.cfg.php
http://127.0.0.1/cblog/include/configs/end.cfg.php
2. Cross-Station vulnerability
The user name in C-blog is not strictly filtered to cause a cross-site vulnerabi
Release date:Updated on:
Affected Systems:ZyXEL P-660HW-T1 v3Description:--------------------------------------------------------------------------------Zyxel P-660HW-T1 is a wireless router product.
P-660HW-T1 wireless router Version 3 Management Panel security vulnerability, attackers can exploit this vulnerability t
Vulnerability Information Reference report details on the cloudThe local tests are as follows:Connect Xiaomi's WiFi login admin background page has a password boxWireshark Capture package found the default transfer username is adminSave Wireshark caught packet to filter out HTTP messagesFind the following:Xiaomi Smart Router token parameter to determine the current user status of timelinessBut the token par
Release date:Updated on: 2014-06-03
Affected Systems:Huawei E303Description:--------------------------------------------------------------------------------Bugtraq id: 67747CVE (CAN) ID: CVE-2014-2946The Huawei E303 router is a wireless broadband modem.Huawei E303 Router (firmware version CH2E303SM) has a Cross-Site Request Forgery Attack on/api/sms/send-sms URL implementation. Remote attackers use the requ
Release date:Updated on:
Affected Systems:Belkin Wireless Router Belkin N900 F9K1104v1Description:--------------------------------------------------------------------------------Bugtraq id: 57128CVE (CAN) ID: CVE-2012-6371Belkin Wireless Routers is a Wireless router product of Belkin.The implementation of Belkin N900 F9K1104v1 and other versions of WPA2 creates a wps pin based on a 6-digit LAN/wlan mac addr
systems of Cisco router IOS, which may expose sensitive information. This vulnerability allows a low-level user (for example, a user who does not know the 'enable' password) to use the system to view some information, in theory, this information should be visible only to users who know the 'enable' password. This information includes the access control list and other content. Generally, after logging on to
supported code warehouse is: First of all, a more cumbersome, But the more intuitive way: Choose your code warehouse, and here we take GitHub as an example to illustrate: Select the account you want to add: To add a warehouse that needs to be scanned if it is a Nodejs project, he will automatically associate it, and if it does not automatically correlate, generate a test report by clicking on the location where you added the file. The view report and
ASUS router command execution vulnerability CVE-2014-9583
A serious security vulnerability exists in the firmware of the ASUS router, allowing unauthenticated command execution.
CVE
CVE-2014-9583.
Affected Versions
Currently, all known router firmware versions (RT-AC66U, RT
Release date:Updated on:
Affected Systems:Huawei AR Series router 3200Huawei AR Series router 2200Huawei AR Series router 200Huawei AR Series router 150Huawei AR Series router 1200Description:--------------------------------------------------------------------------------Bug
Release date:Updated on:
Affected Systems:TP-LINK TD-8817 6.0.1 Build 111128 Rel.26763Description:--------------------------------------------------------------------------------Bugtraq id: 58921The TP-Link TD-8817 is an ADSL2 + Ethernet/USB modem router.The Default User (admin) password for the TP-Link TD-8817 can be changed on TCP/IP Port 80 through the default router page. You can change the password without the $ _ POST request method. Attackers c
Fiber home HG-110 (adsl/router) Vulnerability
Release date:Updated on:
Affected Systems:Fiber home hg-110 1.0.0Description:--------------------------------------------------------------------------------Fiber home hg-110 is a router of beacon technology.
A security vulnerability exists in the implementation of the f
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.