Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2021-24193 | CWE-287 | $5,000 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | High | Remote | 2020-08-10 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.02192 | 0.50148 |
# Exploit Title: TRCwifiZone Authentication Bypass # Date: 08.09.2020 # Exploit Author: M. Haluk Kuscuoglu # Vendor: Turcom # Software Link: https://www.turcom.com.tr/urunlerimiz-sorunsuz-internet-trcwifizone.asp # Version: All # Tested on: Windows 10 # CVE: - Description: TRCwifiZone is the hotspot solution of Turcom company. Vulnerability Point: http://trcwifizone/manage/ Trigger Example: http://trcwifizone/manage/control.php Exploitation Method: Call admin panel link http://trcwifizone/manage/control.php while your proxy tool (reccomended Burp Suite) enabled. Then, look 302 redirection response and you will see admin panel page. PoC Screenshots: 1. https://imgur.com/xt9FHkL 2. https://imgur.com/jHY6kpA 3. https://imgur.com/bKsWgy4 4. https://imgur.com/7cHev8j
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.