-
Notifications
You must be signed in to change notification settings - Fork 224
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DGN1000 #3
Comments
I should have add a little loop and check the length of the returned string :) |
I'm not sure if there is any difference to the device reported above, but the backdoor is also present in the "Netgear N150 DGN1000B". By the way: Nice Work! Perhaps could you give some more information about the tools you used? |
Thank you I updated the README :) |
@elvanderb I forgot to ask, do you raccommed other alternative firmwares without this exploit? I tried to look at pfsense and openwrt and it seems this router isn't supported |
No, sorry :) |
Update: The DGN1000B is the firmware for countries which use Annex B (eg. Germany) for DSL. |
Your script returns:
Anyway with DGN1000 Netgear N150 and the script below I'm able to see the password in cleartext.
I tried also over internet (with or without remote administration enabled) and it doesn't work, so it seems just a local LAN exploit.
The text was updated successfully, but these errors were encountered: