Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      1337day-Exploits

      LW-N605R Remote Code Execution

      Recommended Posts

      LW-N605R devices allow remote code execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Python Obfuscator for FUD Python Code.
          Obfuscation Method List
          Obfustucators ( * = May cause Syntax Errors )
          -=============-
          0 /one_line/hex
          1 /one_line/base64
          2 /one_line/base32
          3 /one_line/gunzip*
          4 /one_line/rot13*
          5 /cmd/command
          6 /cmd/powershell
          7 /cmd/powershellhidden

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. this script will scan your code
          the script can find
              check_file_upload issues
              host_header_injection
              SQl injection
              insecure deserialization
              open_redirect
              SSRF
              XSS
              LFI
              command_injection
          features
              fast
              simple report

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Full Orcus 1.9.1 Source Code

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Comcast TV Remote Hack Opens Homes to Snooping
           
          🌀Researchers disclosed the ‘WarezTheRemote’ attack, affecting Comcast’s XR11 voice remote control.
          🌀A security flaw allowing attackers to remotely snoop in on victims’ private conversations was found to stem from an unexpected device – their TV remotes.
          🌀The flaw stems from Comcast’s XR11, a popular voice-activated remote control for cable TV, which has more than 18 million units deployed across the U.S. The remote enables users to say the channel or content they want to watch rather than keying in the channel number or typing to search.
          🌀However, researchers found a serious vulnerability in the remote, allowing attackers to take it over (details below). Worse, the ensuing attack, dubbed WarezTheRemote, does not require any interaction from the victim — it’s extremely cheap to carry out (a hacker merely needs a low-priced RF transceiver and antenna), and can be launched remotely (from up to 65 feet away).
           
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. APK Lab
          The ultimate Android RE experience right inside your VS Code.
          APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer, and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE.
          Features
              Decode all the resources from an APK
              Disassemble the APK to Dalvik bytecode aka Smali
              Decompile the APK to Java source
              Analyze & Hack effectively with feature-rich VS Code
              Build an APK from Smali and resources
              Sign the APK seamlessly during the build
              Install the APK directly from VS Code
              Support for Apktool-style projects (apktool.yml)
              Support for most Apktool CLI arguments
              Android resource frameworks management (Coming soon!)
              Support for user-provided keystore for APK signing
              Download and configure missing dependencies
              Excellent Smali language support with Smalise
              Supports Linux, Windows, and Mac
          Changelog v1.4
          Added
              apk-mitm updated to v0.12.0
              New GitHub Org and website
              Add ‘show inconsistent code’ arg to jadx (#127) (thanks @psolyca)
              Add deobfuscation args to jadx (#117) (thanks @psolyca)
          Fixed
              show quark analysis report on project open (#121)
              use common process executor for quark analysis (#125)
              refactor project src dir structure (#122)
              dep: bump dependencies (#128)
              CI: fix Quark analysis tests (#126)

          Hidden Content
          Give reaction to this post to see the hidden content.