Step 1: Target Identification: Identify vulnerable Ascend or 3Com router(s) on the network. This can be achieved through network scanning and device fingerprinting.
Step 2: Packet Crafting: Construct a TCP packet with a zero-length TCP option. This involves setting the TCP option length field to zero while including the option in the packet.
Step 3: Packet Delivery: Send the crafted TCP packet to the target router's listening port (typically a port used for network management or control).
Step 4: Vulnerability Trigger: The router processes the malformed packet, triggering the vulnerability within the TCP/IP stack.
Step 5: Denial of Service: The router crashes or reboots due to the processing error, resulting in a DoS condition.