Exploit/Advisories

Published on October 29th, 2020 📆 | 4493 Views ⚑

0

Genexis Platinum-4410 P4410-V2-1.28 Cross Site Request Forgery ≈ Packet Storm


iSpeech.org

# Exploit Title: Genexis Platinum-4410 P4410-V2-1.28 - Cross Site Request Forgery to Reboot
# Date: 10/28/2020
# Exploit Author: Mohammed Farhan
# Vendor Homepage: https://genexis.co.in/product/ont/
# Version: Platinum-4410 Software version - P4410-V2-1.28
# Tested on: Windows 10
# Author Contact: https://twitter.com/farhankn

Vulnerability Details
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Login to the application
Create an HTML file using the below mentioned code



T">








Open the HTML page in the browser and Click on "Submit Request"
Note that modem reboots after the same


Source link

Tagged with:



Comments are closed.