Our newest post of this interesting series of Shodan to RCE takes us to Belkin routers.
“Server: httpd” “Cache-Control: no-cache,no-store,must-revalidate, post-check=0,pre-check=0” “100-index.htm”
As at the time of writing this post, there were not so many results for the Belkin routers )-:
By navigating to one of the shodan search results, we may get such a dashboard, which in itself may be reported as a security vulnerability? – unauthorized access?, information disclosure?
Getting key, method #1
By navigating to the link http://target//langchg.cgi and view the source..
The key can be clearly seen above, without authentication!
Getting key, method #2
By navigating to the link http://target/adv_wifidef.cgi and view the source..
Again, the key can be clearly seen above, without authentication!
Credits to the exploit author: Wadeek.
One thought on “From Shodan to Remote Code Execution #3: Hacking the Belkin N600DB Wireless Router”
Thanks for sharing interesting topic point of belkin routers because no where is talking about routers hacking. Waiting for next interesting post.
Now i am coming at my section :- If anyone wants answer of this question then go through with our link :
How do I access the web-based setup page of the router?