2Wire

3Com

Arris

Belkin

Cisco

D-Link

Huawei

Motorola

Netgear

Siemens

Thomson

TRENDnet

ZyXEL


MAC to Vendor Lookup and Search (mac_find)

Default Password List (phenoelit)

Computer Search Engine (shodan)

Backdoor password in Accton-based switches (3com, Dell, SMC, Foundry and EdgeCore)

Huawei HG5XX Mac2wepkey Default Wireless Key Generator



2Wire

1700HG, 1701HG, 1800HW, 2071HG, 2700HG, 2701HG-T, 3800HGV-B

[?] EXPLOIT
07/14/11 [+] 20x 27x authentication bypass (xss + info disclosure)
10/29/09 [+] 17x 18x 20x 27x CRLF denial of service remote MDC [IP]
10/29/09 [+] 17x 18x 20x 27x CRLF denial of service [IP]
08/18/09 [+] 17x 18x 20x 27x password_required.html authentication bypass [IP]
08/11/09 [+] 17x 18x 20x 27x CD35_SETUP_01 authentication bypass [IP]
08/11/09 [+] 17x 18x 20x 27x CD35_SETUP_01 password reset [IP]
04/13/08 [+] 17x 18x 20x 27x DSL denial of service [IP]
08/07/08 [+] 17x 18x 20x 27x mgmt_data configuration disclosure [IP]
01/30/08 [+] 17x 18x 20x 27x H04 authentication bypass [IP]
08/14/07 [+] 17x 18x 20x 27x 38x Add domain to hosts table CSRF [IP]
^ Top


3Com

OfficeConnect Wireless 11g Cable/DSL Gateway, AP 8760 3CRWE876075, 812, 3CRWE454G72, 3cradsl72

[?] EXPLOIT
09/02/10 [+] Backdoor password in Accton-based switches (3com, Dell, SMC, Foundry and EdgeCore)
05/21/10 [+] iMC Intelligent Management Center configuration disclosure [IP]
05/21/10 [+] iMC Intelligent Management Center traversal [IP]
10/19/09 [+] OfficeConnect command execution [IP]
11/14/08 [+] AP 8760 auhentication bypass [IP]
06/16/08 [+] OfficeConnect configuration disclosure [IP]
06/01/05 [+] OfficeConnect 3CRWE454G72 configuration disclosure [IP]
04/16/05 [+] 3cradsl72 configuration disclosure [IP]
10/13/04 [+] 3cradsl72 information disclosure & authenication bypass [IP]
00/00/01 [+] 812 denial of service [IP]
00/00/01 [+] 812 denial of service 2 [IP]
^ Top


Arris

WTM652

[?] EXPLOIT
00/00/0? [+] Arris Password of The Day (list.txt)
00/00/0? [+] Arris password of the day web interface
^ Top


Belkin

Belkin Wireless G router F5D7234-4, F5D7230-4, MIMO F5D9230xx4

[?] EXPLOIT
05/30/11 [+] F5D7234-4 v5 admin password md5 [IP]
08/25/08 [+] F5D8233-4 v3 configuration disclosure [IP]
08/25/08 [+] F5D8233-4 v3 router reboot [IP]
08/25/08 [+] F5D7230-4 factory reset [IP]
02/03/08 [+] F5D7230-4 change dns servers [IP]
01/20/08 [+] MIMO F5D9230xx4 configuration disclosure [IP]
^ Top


Cisco

Linksys WRT54G, WAG120N

[?] EXPLOIT
02/26/11 [+] WAG120N Change admin password [IP]
02/26/11 [+] WAG120N Add admin user [IP]
05/26/10 [+] WAP54Gv3 debug interface (Gemtek:gemtekswd) [IP]
02/26/08 [+] WRT54G enable remote interface [IP]
02/26/08 [+] WRT54G config disclosure [IP]
02/26/08 [+] WRT54G restore factory defaults [IP]
01/21/08 [+] WRT54G last password in plain text [IP]
06/05/06 [+] WRT54G disable wifi encription [IP]
06/05/06 [+] WRT54G change admin password [IP]
^ Top


D-Link

D-Link DWL 2100AP, 704P, DIR-615, DSL-502T, DSL-504T, DSL-562T, DSL-G604T, DWL-7000AP, DWL-7100AP

[?] EXPLOIT
12/22/10 [+] D-Link WBR-1310 Authentication Bypass set new password [IP]
11/09/10 [+] D-Link DIR-615, DIR-320, DIR-300 Authentication Bypass [IP]
06/29/10 [+] D-Link DAP-1160 Authentication Bypass [IP]
12/15/09 [+] D-Link DIR-615 change password & enable remote admin [IP]
02/05/08 [+] DSL-G604T change DNS servers
08/25/08 [+] D-Link DIR-615 configuration disclosure [IP]
00/00/0? [+] 704P denial of service [IP]
10/20/06 [+] DSL-G624T DSL-G604T directory traversal [IP]
06/06/06 [+] DWL-7x00AP configuration disclosure [IP]
05/20/05 [+] G604T DSL Routers "firmwarecfg" Authentication Bypass [IP]
^ Top


Huawei

EchoLife HG520b, EchoLife HG520c, EchoLife HG530, SmartAX MT880

[?] EXPLOIT
01/11/11 [+] HG5XX mac2wepkey default wireless key generator
05/29/10 [+] HG520c HG530 enable remote management CSRF [IP]
05/16/10 [+] HG520c HG530 Listadeparametros.html information disclosure [IP]
03/28/10 [+] HG520c HG530 AutoRestart.html denial of service & factory reset [IP]
03/28/10 [+] HG520 LocalDevicejump.html denial of service [IP]
08/24/09 [+] SmartAX MT880 default password [IP]
08/24/09 [+] SmartAX MT880 add administrator account [IP]
08/24/09 [+] SmartAX MT880 disable firewall/anti-dos w/default pass [IP]
00/00/0? [+] ZyNOS configuration disclosure [IP]
^ Top

Motorola

SBG900

[?] EXPLOIT
07/22/11 [+] SBG900 change admin password [IP]
07/22/11 [+] SBG900 turn off firewall [IP]
07/22/11 [+] SBG900 enable remote access [IP]
07/22/11 [+] SBG900 disable DHCP & add custom DNS server [IP]
^ Top


Netgear

FVS318, DG632, SSL312 VPN, WNR2000, WNDAP350, WNAP210, WG602, WGR614v9, CG3100D, RP614v4

[?] EXPLOIT
04/05/11 [+] WNAP210 authentication bypass [IP]
07/22/11 [+] WNDAP350, WNAP210 BackupConfig.php config disclosure [IP]
08/14/10 [+] CG3100D privilege escalation [IP]
03/24/10 [+] RP614v4 config disclosure [IP]
08/24/09 [+] WNR2000 information disclosure [IP]
08/24/09 [+] WNR2000 information disclosure [IP]
08/20/09 [+] WNR2000 config disclosure [IP]
06/15/09 [+] DG632 auth bypass (config disclosure) [IP]
06/15/09 [+] DG632 auth bypass [IP]
06/15/09 [+] DG632 'firmwarecfg' denial of service [IP]
11/13/08 [+] WGR614v9 denial of service [IP]
02/27/08 [+] SSL312 VPN denial of service [IP]
01/24/05 [+] FVS318 content filtering bypass [IP]
01/24/05 [+] FVS318 log file arbitrary content injection [IP]
08/12/04 [+] DG834G enable telnet root shell [IP]
08/12/04 [+] WG602 undocumented admin account (superman) [IP]
08/12/04 [+] WG602 undocumented admin account (super) [IP]
^ Top


Siemens

SpeedStream 5200, Gigaset SE461 WiMAX, NOKIA Siemens FlexiISN

[?] EXPLOIT
03/30/09 [+] FlexiISN auth bypass AAA Configuration [IP]
03/30/09 [+] FlexiISN auth bypass Aggregation Class Configuration [IP]
03/30/09 [+] FlexiISN auth bypass GGSN general Configuration [IP]
03/30/09 [+] FlexiISN auth bypass Network Access & services [IP]
06/16/08 5200 Default administrator account [IP]
06/16/08 [+] 5200 Host authentication bypass [IP]
06/16/08 [+] 5200 Configuration disclosure /.cfg [IP]
08/02/08 [+] SE461 denial of service [IP]
^ Top


Thomson

SpeedTouch ST585, TG585n, 7G (bthomehub)

[?] EXPLOIT
12/09/09 [+] ST585, TG585n user.ini arbitrary download vulnerability [IP]
06/10/08 [+] ST585 Redirect domain CSRF [IP]
06/10/08 [+] ST585 Add administrator account CSRF [IP]
02/14/08 [+] bthomehub call number (voice-jacking) auth bypass [IP]
11/08/07 [+] bthomehub authentication bypass [IP]
11/08/07 [+] bthomehub enable remote access and change tech password [IP]
11/08/07 [+] bthomehub disable wifi [IP]
^ Top


TRENDnet

TEW-633GR

[?] EXPLOIT
02/26/08 [+] TEW-633GR A-to-C authentication bypass [IP]
02/26/08 [+] TEW-633GR unauthorized factory reset [IP]
^ Top


ZyXEL

ZyXEL Prestige, G-570S, P-660H-D1, P-660H-D3, P-660HW-D1, Zywall2, ZyWall USG

[?] EXPLOIT
05/04/11 [+] ZyWALL USG client side authorization config disclosure [IP]
02/18/09 [+] G-570S configuration disclosure [IP]
03/03/08 [+] Prestige configuration disclosure [IP]
02/19/08 [+] Prestige privilege escalation [IP]
00/00/0? Prestige default password [IP]
00/00/0? [+] ZyNOS configuration disclosure [IP]
10/08/07 [+] Zywall2 Persistent Cross Site Scripting [IP]
11/21/04 [+] Prestige unauthorized reset [IP]
^ Top