This Metasploit module will reset the admin password on a 2Wire wireless router. This is done by using the /xslt page where authentication is not required, thus allowing configuration changes (such as resetting the password) as administrators.
c659eefe3238d797bd315c2ac1e94529da0ef7e9f8debd9eb22623e8a09b0e4d
Huawei HG866 suffers from an authentication bypass vulnerability.
16b27553e6e0277a5015d3f4a49f1169f8582339506c73a076accba963331501
Huawei EchoLife HG520c suffers from denial of service and modem reset vulnerabilities.
66aa9c5aec97e9470277eb5a64ffdf81e18b2339e245205ba142ce0fe6837817
Huawei EchoLife HG520 suffers from a remote information disclosure vulnerability.
d9aa1dd9a985d8e7481305c0727f477bc6b3356e6b7919fdd8f0d3fa0e7278a5
Remote denial of service exploit for 2WIRE routers versions 5.29.52 and below.
e3b006e2a7c7c7b3426aacaabe03e0445247cd62c49a9c6a978b74f4b3ae1ffd
The remote management interface on tcp/50001 of various 2WIRE devices suffers from a remote denial of service vulnerability.
a570b0dd205bdccb99ddb73341fe1654b9625e26ea61d1a590c32f42dec42430
2Wire Gateways suffer from a remote password reset vulnerability that allows for authentication bypass. Versions 2071 Gateway, 1800HW, and 1701HG are vulnerable.
bcf03cf41785e1546ced74abf07c45219887bda85fd037204944016c0203f0b3
2Wire DSL router models 1701HG, 1800HW, 2071HG, and 2700HG all suffer from denial of service vulnerabilities.
1d99a685969aaf6b81a57ccdce1ae6032814a65f935e0c4c2164bfe453079db5
Whitepaper entitled Using Parent Domain Traversal In Drive By Attacks.
d4d787c3d1f2cecfefafa05d2971a62b461e882fb8960cf9235ced39cfdd1187
The SpeedStream 5200 suffers from an authentication bypass vulnerability via Host header modification.
0e3c38f2cac373a41d993ae5af53a61eab5944e2da8abbaba6e29cc9d4d4e7c5
2wire routers versions 1701HG and 2071 Gateway are susceptible to cross site request forgery attacks.
6e7c23ea90ad8a1a27332592fa4fb20f3c7323f8e82e7c0ce27f431e06c7a3ab