Resetting those cable modems does nothing but cause them to reboot and reload a config file.
BUT, an attacker has to be ON a PRIVATE RFC 1918 network, inaccessible from the Internet in ALL cases.
They would also have to connect to each modem in order to accomplish said feat. It would take a very long time to scan the entire address space and find any modems in it.
A user can reset the modem and erase every setting in it a thousand times a day, matters naught. It will resume correct operation every single time when it gets an IP address assigned to it and the bootp config file is delivered. A user cannot reset the contents of the modem bootp config file provided by the provider DHCP server. Every type of modem has a specfic bootp config file.
What exploit? It's not an "exploit". It was intentionally designed that way.
Yeah...? And you're going to get all the existing SB6141 modem owners to access that webpage how?
Therefore impossible to execute directly from the WAN side.
None, because they can't change it.
Irrelevant since the modem is bridging a public address and gateway to whatever is connected on the other side of it in the LAN anyway.
Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here.
All logos and trade names are the property of their respective owners.