ZTE ZXV10 W300 v3.1.0c_DR0 - Remote Session Delete Vulnerability

ZTE ZXV10 W300 v3.1.0c_DR0 - UI Session Delete Configuration Vulnerability

A session vulnerability has been discovered in the official ZTE Corporation ZXV10 W300 v3.1.0c_DR0 modem hardware. The security vulnerability allows remote attackers to block/shutedown or delete network settings and components.

The LAN configuration post to /Forms/home_lan_1 and the page  /home_lan_1  that stores the configuration of the router. Attackers can request via GET method the /Forms/home_lan_1  path and the modem will delete all the LAN configurations automatically.  The problem is the GET method request with the /Forms/home_lan_1  path that deletes all the configurations. A hard reset is required after successful exploitation of the issue.

The video has been recorded by the vulnerability researcher hadji samir. The issue demonstrates a problem in the lan configuration settings of the firmware. The session allows anybody to delete with one url post request the full network settings and information. By usage of an automatic routine we was able to demonstrate the bug deleting the current network setup. The issue is a session vulnerability that is possible to exploit because of no limitation to the request itself.

ZTE ZXV10 W300 v3.1.0c_DR0 - UI Session Delete Configuration Vulnerability (Video Demonstration)

Video: http://www.vulnerability-lab.com/get_content.php?id=1523

Advisory: http://www.vulnerability-lab.com/get_content.php?id=1522

Rate this article: 
Average: 5 (3 votes)


Creative analysis , I loved the facts.

Add new comment

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.