Twitter | Search | |
RedTeam Pentesting 27 Mar 19
Small Business Routers still vulnerable to remote code execution & configuration export due to incomplete patch 🚨 New advisories:
Reply Retweet Like
RedTeam Pentesting 27 Mar 19
Reply Retweet Like
some person 27 Mar 19
They... They seriously just blacklisted the curl useragent, and blocked single quotes?! I'll update the PoC exploits soon.
Reply Retweet Like
Constantine A. M. 29 Mar 19
Isn't proxy_pass a noop in that config, since a rewrite takes precedence?! That's really bad code, though! Wrong way to issue redirect!
Reply Retweet Like
RedTeam Pentesting 1 Apr 19
Replying to @Mcnst @info_dox and 3 others
Interesting observation πŸ€” they probably switched the web interface to HTTPS at some point in time...
Reply Retweet Like
boB β€’ Person Woman Man Camera TV β€’ Rudis 27 Mar 19
wait… O_O 😞
Reply Retweet Like
boB β€’ Person Woman Man Camera TV β€’ Rudis 27 Mar 19
No, Cloudflare's front end just doesn't like whatever you are sending to HIBP (which has nothing to do with junk-heap-worthy Cisco routers)
Reply Retweet Like
boB β€’ Person Woman Man Camera TV β€’ Rudis 27 Mar 19
Unfortunately, nobody bothered to get their kit off the internet (roughly same #'s still out there). FWIW I'm not seeing nginx.conf in the .img files for that bit of firmware. What did you unpack it with?
Reply Retweet Like
Philip 27 Mar 19
Try binwalk then cpio. The RV32X series uses .bin files though.
Reply Retweet Like
Erik 27 Mar 19
"There, I fixed it." :-(
Reply Retweet Like
Indoor Robot Apocalypse 27 Mar 19
"fixed forever"
Reply Retweet Like
θ‡ͺε‹•εŒ–θΎ²δ½œη‰© 🌽 27 Mar 19
-H User-Agent is the cure 😎
Reply Retweet Like
Jima 27 Mar 19
or --user-agent or -A or...
Reply Retweet Like