'description':'Module exploits Technicolor DWG-855 Authentication Bypass vulnerability which allows changing administrator\'s password.\n\nNOTE: This module will errase previous username&pass, this is NOT stealty.',
'authors':[
'JPaulMora <https://JPaulMora.GitHub.io>',
# vulnerability discovery,routersploit module
],
'references':[
'No references, at time of write its a 0day. Check my page though I probably wrote something about it.',
],
'devices':[
'Technicolor DWG-855',
]
}
target=exploits.Option('192.168.0.1','Target address e.g. http://192.168.0.1',validators=validators.url)
port=exploits.Option(80,'Target Port')
nuser=exploits.Option('ruser','New user (overwrites existing user)')