Unauthenticated access to sensitive files
It was observed that the web application running on the router, allows unauthenticated access to sensitive files on the web server. By sending a simple GET request without authentication cookie one can get see valid responses. Other resources accessible are: /config/dialup/config.xml, /config/global/config.xml, /config/global/net-type.xml, /config/lan/config.xml, /config/pcassistant/config.xml, /config/voice/config.xml, /config/wifi/configure.xml. It was also observed that an unauthenticated user can generate “SessionID” and “__RequestVerificationToken” by simply sending an HTTP GET request to “/api/webserver/SesTokInfo”. These tokens, although might not give the user full access to the router but using these, one can access to several restricted resources on the router.