OpenSSHD versions 7.2p2 and below remote username enumeration exploit.
2f182c8354b3885f9f53dee4dfd49de6b64a388306dc36b6cf716adfc0ef8ac9
This is a brief overview of the unauthenticated non-persistent remote root shell vulnerability in various D-Link DSR routers. Versions affected include D-Link DSR-150 (Firmware < v1.08B44), D-Link DSR-150N (Firmware < v1.05B64), D-Link DSR-250 and DSR-250N (Firmware < v1.08B44), D-Link DSR-500 and DSR-500N (Firmware < v1.08B77), D-Link DSR-1000 and DSR-1000N (Firmware < v1.08B77).
de55e4448a4bec277f8621aefbf5e5ac01929a5f13a3f4b74cc2b5712046d40e
D-Link DSR router series remote root shell exploit. Versions affected include D-Link DSR-150 (Firmware < v1.08B44), D-Link DSR-150N (Firmware < v1.05B64), D-Link DSR-250 and DSR-250N (Firmware < v1.08B44), D-Link DSR-500 and DSR-500N (Firmware < v1.08B77), D-Link DSR-1000 and DSR-1000N (Firmware < v1.08B77).
0ddcd599410d5c9d4349753fb1f66fbb2cd3e9606f56a18a28615b7d3f5dd814
D-Link DSR-250N has a backdoor account that allows for persistent root access.
80fd9d3e7fad566709a302521d1f123f923a95c1459f2c137d1705ee73d4dd6c
189 bytes small add user t0r with password of Winner shellcode for Linux x86_64.
241545198395d326774323f27d944073f582076812a68301bd6bb70961f8cd60