Am Mit, 2002-12-11 um 08.27 schrieb Josh Rehman: > It's interesting, the advisory claims that this can be exploited even > when remote admin is disabled. I tried to break my own router with their > advice, but it didn't work. (Maybe a kind soul has already cracked my > router and updated my firmware for me? :-) > > Presumably you can reset the password with this: > http://192.168.1.1/Gozila.cgi?setPasswd=hola&RemoteManagement=1&.xml=1 > > (replace the ip with the ip of your router's local interface) but this > didn't do nuttin for me... >
Stupid question: Does anyone know of a vulnerability of ASUS DSL routers? I got one from my ISP and i would really love to have a look at its configuration ;) Note: Since i only rent the modem from my ISP, flashing the EEPROM is not an option. If anyone has an idea how to get or reset the password/login, please drop me a note. The model is called A*A*M*6*3*1*0 (without "*"). -- Matthias Hentges [www.hentges.net] -> PGP + HTML are welcome ICQ: 97 26 97 4 -> No files, no URLs My OS: Debian Woody: Geek by Nature, Linux by Choice -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]