:: Deepquest ::

This site contains information which could be considered illegal in some countries. It is provided here for educational use only and is not intended to be used for illegal activities.

CONN_SECURE
2026-05-09
05:06:43 UTC
  • Home
  • Archives
  • ::Pepe::
  • Links
  • Coming soon
root@deepquest.code511.com:~# 

>> CATEGORY: exploit

[EXPLOIT]

>> Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Denial Of Service

USER: deepcore // 2018-07-17 // 0 CMT

Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems have an undocumented and hidden feature that allows an authenticated attacker to list running processes in the operating system and send…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Hidden Features

USER: deepcore // 2018-07-17 // 0 CMT

Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems have undocumented and hidden features present via the web management interface. These features allow an authenticated attacker to take full control…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Arbitrary File Attacks

USER: deepcore // 2018-07-17 // 0 CMT

Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems suffer from an issue where due to the hidden and undocumented File Editor (Filesystem Browser) shell script ‘system-editor.sh’ an attacker can…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Configuration Download

USER: deepcore // 2018-07-17 // 0 CMT

Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems suffer from a system backup configuration file ‘IPn4G.config’ in ‘/’ directory or its respective name based on the model name including…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Open Redirect

USER: deepcore // 2018-07-17 // 0 CMT

Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems suffer from an open redirection vulnerability. Many versions are affected.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Backdoor Jailbreak

USER: deepcore // 2018-07-17 // 0 CMT

Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems have a web shell application that includes a service called Microhard Sh that is documented only as ‘reserved for internal use’….

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Nanopool Claymore Dual Miner APIs Remote Code Execution

USER: deepcore // 2018-07-17 // 0 CMT

This Metasploit module takes advantage of miner remote manager APIs to exploit an remote code execution vulnerability.

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> QNAP Q'Center change_passwd Command Execution

USER: deepcore // 2018-07-17 // 0 CMT

This Metasploit module exploits a command injection vulnerability in the change_passwd API method within the web interface of QNAP Q’Center virtual appliance versions prior to 1.7.1083. The vulnerability allows the…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> Binance v1.5.0 – Insecure File Permission Vulnerability

USER: deepcore // 2018-07-17 // 0 CMT

An independent vulnerability laboratory researcher discovered an insecure file permission vulnerability in the Binance v…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
[EXPLOIT]

>> BMW – (Token) Cross Site Scripting Web Vulnerability

USER: deepcore // 2018-07-17 // 0 CMT

…

Share this:

  • Share on Telegram (Opens in new window) Telegram
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Posts pagination

[PREV] 1 … 959 960 961 … 2,233 [NEXT]

CATEGORIES

  • exploit (22328)
  • Security (13937)
  • defacement (7127)
  • m$ (3217)
  • Apple (1485)
  • Wikileak (862)
  • DDOS (575)
  • Snowden (474)
  • facebook (468)
  • twitter (461)

ARCHIVES

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

DEFACEMENT_LOG

TOTAL DEFACEMENTS LOGGED:
000000
// STATUS: ACTIVE // LAST: 2026-05-01
// SYSTEM
HOST deepquest.code511.com
PHP 8.3.23
KERNEL DeepQuest-Terminal v1.4
// DATABASE
POSTS 43721
CATEGORIES 33
COMMENTS 212
USERS 1831
// SESSION
DATE 2026-05-09
TIME 05:06:43 UTC
UPTIME [ONLINE]
STATUS OK
// INFO
COPY © 2026 :: Deepquest ::
LICENSE EDU_USE_ONLY
EOF | SESSION_TERMINATED | root@deepquest.code511.com:~# _