![]() ![]() ![]() if mkdir $LOCK_FILE 2 >/dev /null then trap ']*?, \"type \": \"A \".*/\1/" ` if then echo "Unable to retrieve CloudFlare record ID for the zone." exit 1 fi FLARE=$ (curl -s https: ///api_json.html \ API_KEY= 'f5fdb672c54bb7d72dbeec35e822d90ce14e1' # INTERNALS # LOCK_FILE= '/var/lock/zte-cloudflare' # Acquire a lock. Vulnerability Insight: webshellcmd.gch on ZTE F460 and F660 cable modems allows remote. EMAIL= # Set this to your CloudFlare API key. Summary: ZTE F460/F660 are prone to an unauthorized-access vulnerability. RECORD_NAME= '' # Set this to your account e-mail address. DOMAIN= '' # Set this to the A record name. It has been reported that the webshellcmd.gch script is sometimes accessible from the WAN interface making exploitation of this backdoor from the Internet. The webshellcmd.gch script accepts unauthenticated commands that have administrative access to the device. # CONFIGURATION # ZTE router IP or hostname ZTE_LOCAL_ADDRESS= '192.168.0.1' # ZTE router username ZTE_USERNAME= 'sm5lty' # ZTE router password ZTE_PASSWORD= 'goM0k1' # Set this to the cloudflare zone name. Description: ZTE F460/F660 cable modems contain an unauthenticated backdoor. Zte-f660rv1-cloudflare.sh #!/bin/sh # Copyright (C) Wizardry and Steamworks 2016 - License: GNU GPLv3 # Please see: for legal details, # rights of fair usage, the disclaimer and warranty conditions. Two mobile phones, developed by Chinese telecommunications device manufacturer ZTE, have been found to carry a hidden backdoor, which can be used to instantly.
0 Comments
Leave a Reply. |