this script exploit multi zero days discovered on the hexabyte default router. Check this blog post for more details: http://www.katsumoto-security.com/blog/hexapwn-vulnerabilities-that-affect-thousands-of-hexabyte-customers/
usage :
_ _
| | | | _____ ____ _ _ ____ ___ __
| |_| |/ _ \ \/ / _` | '_ \ \ /\ / / '_ \
| _ | __/> < (_| | |_) \ V V /| | | |
|_| |_|\___/_/\_\__,_| .__/ \_/\_/ |_| |_|
|_|
v1.0
K4tsum0t0 Security Team
[+] Checking 192.168.1.1 ...
[+] Vulnerable
admin password : admin
[+] extracting WAN credentials ...
username = hexa****@hexabyte.tn
var pwdppp = "**********";
[+] extracting Wireless conf ...
SSID = HEXABYTE_********
WPA = ********
This script is provided as-is without warranty of any kind and is intended for educational purposes only.