漏洞描述 NBG2105是ZyXel的无线迷你旅行路由器位于http://router-IP/js/util_gw.js上的路由器的Javascript公开了函数checkCookie(),该函数显示cookie“登录”。最初,此cookie的值为“ 0”,但是成功登录后,cookie设置为“ 1”。 通过将Cookie的“login”设置为“1”,可以在没有登录凭据的情况下滥用此权限来访问路由器管理页面。 login_ok.htm帮助实现将标志位"login"设置为1
相关漏洞推荐 CVE-2021-3297: Zyxel NBG2105 V1.00(AAGU.2)C0 - Authentication Bypass POC 2025-09-01 | Zyxel NBG2105 V1.00(AAGU.2)C0 On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator acces... CVE-2022-0342: Zyxel authentication bypass patch analysis POC 2025-09-01 | Zyxel An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versio... CVE-2022-30525: Zyxel Firewall - OS Command Injection POC 2025-09-01 | Zyxel Firewall An OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions ... ShowDoc /server/index.php?s=/api/adminUpdate/download 文件上传漏洞(CVE-2021-36440) 无POC 2025-09-12 | ShowDoc ShowDoc 2.9.5版本存在一个高危的文件上传漏洞(CVE-2021-36440),该漏洞源于系统未能对上传文件的类型进行充分验证。攻击者可以绕过安全限制上传任意类型的危险文件,包括但不限于PH... CVE-2021-1497: Cisco HyperFlex HX Data Platform - Remote Command Execution POC 2025-09-01 | Cisco HyperFlex HX Data Platform Cisco HyperFlex HX contains multiple vulnerabilities in the web-based management interface that coul...