漏洞描述 NBG2105是ZyXel的无线迷你旅行路由器位于http://router-IP/js/util_gw.js上的路由器的Javascript公开了函数checkCookie(),该函数显示cookie“登录”。最初,此cookie的值为“ 0”,但是成功登录后,cookie设置为“ 1”。 通过将Cookie的“login”设置为“1”,可以在没有登录凭据的情况下滥用此权限来访问路由器管理页面。 login_ok.htm帮助实现将标志位"login"设置为1
相关漏洞推荐 POC CVE-2018-19326: Zyxel VMG1312-B10D 5.13AAXA.8 - Local File Inclusion POC CVE-2019-12581: Zyxel ZyWal/USG/UAG Devices - Cross-Site Scripting POC CVE-2019-12583: Zyxel ZyWall UAG/USG - Account Creation Access POC CVE-2019-9955: Zyxel - Cross-Site Scripting POC CVE-2020-29583: ZyXel USG - Hardcoded Credentials POC CVE-2020-9054: Zyxel NAS Firmware 5.21- Remote Code Execution POC CVE-2021-3297: Zyxel NBG2105 V1.00(AAGU.2)C0 - Authentication Bypass POC CVE-2021-46387: Zyxel ZyWALL 2 Plus Internet Security Appliance - Cross-Site Scripting POC CVE-2022-0342: Zyxel - Authentication Bypass POC CVE-2022-30525: Zyxel Firewall - OS Command Injection POC CVE-2024-29972: Zyxel NAS326 Firmware < V5.21(AAZF.17)C0 - NsaRescueAngel Backdoor Account POC CVE-2024-29973: Zyxel NAS326 Firmware < V5.21(AAZF.17)C0 - Command Injection POC CVE-2021-3297: Zyxel NBG2105 V1.00(AAGU.2)C0 - Authentication Bypass