The following advisory describes an authentication bypass found in NEXXT routers.
NEXXT Connectivity Solutions develops “state of the art networking devices that help connect people and things together, at home, the office and virtually everywhere”.
An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
We tried to contact NEXXT since August 17 2017, repeated attempts to establish contact went unanswered. At this time there is no solution or workaround for these vulnerabilities.
User controlled input is not sufficiently sanitized and can be exploit by an attacker to bypass the authentication mechanism.
By changing the cookie, an attacker can bypass the login authentication mechanism and login as admin.
Proof of Concept
The setup for testing the PoC we will use Chrome Browser with EditThisCokie plugin.
Browse to the victim’s IP – http://IP:8080/login.asp
Add a new cookie: admin:language=en
Then direct open: http://IP:8080/advance.asp
SSD Advisory – NEXXT Authentication Bypass