Pedro Joaquín

Results 13 issues of Pedro Joaquín

http://www.securityfocus.com/archive/1/536663/30/0/threaded

Information Disclosure on latest firmware (4.0.X) for Telecom Italia ADSL2+ WIFI N (https://www.ilpuntotecnicoeadsl.com/wiki/index.php?title=Modem_ADSL2%2B_Wi-Fi_N) You can get WPA without login loading this link: http://192.168.1.1/ui/ti/basic/wifi24_s (private network) http://192.168.1.1/ui/ti/basic/wifiGuest_s (guest network) http://192.168.1.1/ui/ti/tpl/wifiStatus (5Ghz...

# Exploit Title: Multiple Vulnerabilities in Zhone ADSL2+ 4 Port Wireless Bridge/Router (Broadcom) # Date: 01/09/2015 # ZHONE Firmware: 03.02.20 # Product Name: 6218-I2-xxx # Firmware Link: http://www.zhone.com/support/downloads/cpe/6218-I2/6218-I2_R030220_AnnexA.zip (Login Required)...

Dutch researchers found a way to generate the passwords of the most used routers in the Netherlands. They published this document about it: https://www.usenix.org/system/files/conference/woot15/woot15-paper-lorente.pdf Kylian

http://blog.hsp.dk/d-link-dir-810l-login-bypass/

https://www.securify.nl/advisory/SFY20130601/cisco_rv_series_multiple_vulnerabilities.html

enhancement

http://www.datux.nl/har2009/accton.pdf psy@psy ~ $ ./accton2.pl 11:22:33:44:55:66 MfBq!!uQ en routerpwn da otro resultado

I have found a PoC regarding TP-link wr340gt at https://firebitsbr.wordpress.com/2012/05/25/poc-exploit-tl-wr340gtl-wr340gd-http-basic-authentication-bypass/ there is probably some mistake in the code

4/26/2014 23:43:52 "How about uPnP CSRF? Netgear N300 DGN2200 according to http://www.baesystemsdetica.com.au/Research/Advisories/NETGEAR-DGN2200-Multiple-Vulnerabilities-(AIS-2014 http://osvdb.org/103230 Netgear WNDR3400v3 according to http://disconnected.io/2014/03/18/how-i-hacked-your-router/ Netgear DG384v5 (tested myself) PoC taken from the BAE report hax3 0...

http://seclists.org/fulldisclosure/2014/May/90