Belkin wireless G router ADSL2 modem Auth Bypass Exploit

html code to bypass the webinterface password protection of the Belkin wireless G router adsl2 modem. It worked on model F5D7632-4V6 with upgraded firmware 6.01.





html code to bypass the webinterface password protection of the Belkin wireless G router adsl2 modem.

It worked on model F5D7632-4V6 with upgraded firmware 6.01.08.




Change dns nameservers (ip's can't be the same)























Clear log file







Change time, pwd(if you have old pwd), remote management, UPnP:)

and automatic firmware update (nice combined with DNS poisoning)


old password


new password, twice


login timeout (1-99 minutes)

Time and Time Zone:

daylight saving :
timezone(number)

Enable Automatic Time Server Maintenance
Primary Server
Secondary Server

Remote management:
Any IP address can remotely manage the router

Only this IP address can remotely manage the router
. . .
remote port:
NAT Enabling:
Enable
Disable


UPnP

Enable
Disable


Auto Update Firmware Enabling
Enable
disable



restore factory defaults (and pw:D)





以上就是Belkin wireless G router ADSL2 modem Auth Bypass Exploit的详细内容,更多请关注0133技术站其它相关文章!

赞(0) 打赏
未经允许不得转载:0133技术站首页 » Exploit