lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <5d80962a0811131122t5696ed22kc39ffa90edf234ff@mail.gmail.com>
Date: Thu, 13 Nov 2008 14:22:56 -0500
From: sr. <staticrez@...il.com>
To: Full-Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Netgear WGR614v9 DoS to Admin Interface (internal
	and external)

Not sure how to rate this, but at the same time, i really don't give a shit.
(one of those days...)

You can crash the admin interface by sending a malformed URL to the web
interface of this wireless router. No recovery, a reboot fixes the issue.

Wouldn't even really call it a "malformed URL" either, but whatever.

e.g., http://192.168.1.1/?

all you need to do is add a ? to the end of the URL.

This is with the latest firmware from netgear's site.

that's all folks.

keep on talkin that smack you talk so well.

sr.

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ