欢迎来到福编程网,本站提供各种互联网专业知识!

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

发布时间:1970-01-01 作者:佚名 来源:互联网
<html><head></head><body><b>htmlcodetobypassthewebinterfacepasswordprotectionoftheBelkinwirelessGrouteradsl2modem.<br>ItworkedonmodelF5D7632-4V6withupgraded

html code to bypass the webinterface password protection of the Belkin wireless G router adsl2 modem.

It worked on model F5D7632-4V6 with upgraded firmware 6.01.08.

Change dns nameservers (ip's can't be the same)

Clear log file

Change time, pwd(if you have old pwd), remote management, UPnP:)

and automatic firmware update (nice combined with DNS poisoning)

old password

new password, twice

login timeout (1-99 minutes)

Time and Time Zone:

daylight saving :

timezone(number)

Enable Automatic Time Server Maintenance

Primary Server <select name="time1">

Secondary Server <select name="time2">

Remote management:

Any IP address can remotely manage the router

Only this IP address can remotely manage the router

. . .

remote port:

NAT Enabling:

Enable

Disable

UPnP

Enable

Disable

Auto Update Firmware Enabling

Enable

disable

restore factory defaults (and pw:D)

相关推荐