diff --git a/exploits/hardware/webapps/48668.txt b/exploits/hardware/webapps/48668.txt new file mode 100644 index 000000000..390b583f4 --- /dev/null +++ b/exploits/hardware/webapps/48668.txt @@ -0,0 +1,28 @@ +# Exploit Title: SuperMicro IPMI WebInterface 03.40 - Cross-Site Request Forgery (Add Admin) +# Exploit Author: Metin Yunus Kandemir +# Date: 2020-07-15 +# Vendor Homepage: https://www.supermicro.com/ +# Version: X10DRH-iT motherboards with BIOS 2.0a and IPMI firmware 03.40 +# CVE: CVE-2020-15046 +# Source: https://www.totalpentest.com/post/supermicro-ipmi-webgui-cross-site-request-forgery + +# Description: +# The web interface on Supermicro X10DRH-iT motherboards with BIOS 2.0a and IPMI firmware 03.40 +# allows remote attackers to exploit a cgi/config_user.cgi CSRF issue to add new admin users. +# The fixed versions are BIOS 3.2 and firmware 03.88. + +# PoC : + + + +
+ + + + \ No newline at end of file diff --git a/exploits/hardware/webapps/48669.txt b/exploits/hardware/webapps/48669.txt new file mode 100644 index 000000000..ebe0201c5 --- /dev/null +++ b/exploits/hardware/webapps/48669.txt @@ -0,0 +1,21 @@ +# Exploit Title: Zyxel Armor X1 WAP6806 - Directory Traversal +# Date: 2020-06-19 +# Exploit Author: Rajivarnan R +# Vendor Homepage: https://www.zyxel.com/ +# Software [http://www.zyxelguard.com/WAP6806.asp] +# Version: [V1.00(ABAL.6)C0] +# CVE: 2020-14461 +# Tested on: Linux Mint / Windows 10 +# Vulnerabilities Discovered Date : 2020/06/19 [YYYY/MM/DD] + +# As a result of the research, one vulnerability identified. +# (Directory Traversal) +# Technical information is provided below step by step. + +# [1] - Directory Traversal Vulnerability + +# Vulnerable Parameter Type: GET +# Vulnerable Parameter: TARGET/Zyxel/images/eaZy/] + +# Proof of Concepts:https://TARGET/Zyxel/images/eaZy/ +