Answer the question
In order to leave comments, you need to log in
TP-Link: WebMuzzle Hack
Given: TP-Link WR1043N home router with a hacked web muzzle. The firmware is original.
Statement of the problem: Get access to the webmord or access to the FS (for writing) saving the password and settings . An exploit
was found that allows you to get any file from the FS. I pulled /etc/shadow and /etc/passwd. I was immediately confused by /etc/shadow: it is exactly the same (at least the hash: I did not check each letter, but they are very suspiciously similar) as in the exploit screenshot from the link above.
Through completely non-cunning manipulations, it was obtained that the password for root and Admin is 5up
. But, as expected, it does not fit the webmord. OK. Probably the user data of the web interface is stored somewhere else. Where? Due to my inexperience, I do not see the ability to view the contents of directories.
The router does not respond to telnet, there is no ssh in the standard firmware.
Knowledgeable people, help with advice! :)
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question