GitHub - IBM/ansible-role-infosvr: Ansible role for automating the...
https://github.com/IBM/ansible-role-infosvr
ibm_infosvr_media_dir: the location on your Ansible host where the installation binaries have ibm_infosvr_media_bin dict: the names of the binaries to use for the installation (by default the latest...
ASUS infosvr Authentication Bypass Command Execution Packet...
https://packetstormsecurity.com/files/147284/ASUS-infosvr-Authentication-Bypass-Command-Execution.html
This Metasploit module exploits an authentication bypass vulnerability in the infosvr service running on UDP port 9999 on various ASUS routers to execute arbitrary commands as root.
How To: Seize Control of a Router with RouterSploit
https://null-byte.wonderhowto.com/how-to/seize-control-router-with-routersploit-0177774/
exploits/routers/technicolor/dwg855_authbypass exploits/routers/technicolor/tc7200_password_disclosure exploits/routers/asus/infosvr_backdoor_rce...
ASUS Router 'infosvr' Remote Command Execution | Tenable
https://www.tenable.com/plugins/nessus/80518
The remote device is an ASUS router that contains firmware which is affected by a flaw in its 'infosvr' service due to not properly checking the MAC address of a request.
RouterSploit User Manual - Ethical hacking and penetration testing
https://miloserdov.org/?p=1527
Device is vulnerable! - exploits/asus/infosvr_backdoor_rce. To my horror, the router was vulnerable. In this situation, my kilometer passwords with special symbols have lost their power.
Полный Контроль Над Роутером Asus Из Командной Строки
https://mycyberuniverse.com/ru/linux/full-controling-the-asus-router-via-command-line.html
15 12:38 idd1 lrwxrwxrwx 1 root root 7 Jan 15 12:38 ifconfig -> busybox -rwxrwxrwx 1 root root 25264 Jan 15 12:38 igmpproxy -rwxrwxrwx 1 root root 16852 Jan 15 12:38 infosvr lrwxrwxrwx 1 root root 7...
routersploit v3.4.0 released: Router Exploitation Framework
https://securityonline.info/routersploit-router-exploitation-framework/
Fixing exploits/routers/asus/infosvr_backdoor_rce.py module. Adding credentials used by Mirai botnet.
InfoSphere Information Server, Version 11.3 for Microsoft Windows
https://www.ibm.com/support/pages/infosphere-information-server-version-113-microsoft-windows
InfoSvr_V11.3_Wdws_64.zip. CN0HCML. IBM InfoSphere Information Server Bundle Specification InfoSvr_V11.3_QuickStartGuide.pdf. CN03DML. IBM InfoSphere Information Server product...
SAINTexploit Information: asus_rtn66u_infosvr
https://my.saintcorporation.com/cgi-bin/exploit_info/asus_rtn66u_infosvr
The infosvr service listens on port 9999/UDP. The file common.c in infosvr used in ASUS RT-AC66U and other routers does not properly verify the source MAC address of incoming requests...