Mustafa Khan
Dec 18, 2018 · 2 min read
Image for post
Image for post


So this is the write up for my Asus’s admin panel bypass report that most of my friends were asking me. If you have private programs to test feel free to contact me on

The vulnerability was within their (.in) domain ( it was a PHP based admin panel and the vulnerability were:

1: forced browsing. (Want to know more? click here)

2: HTTP response tampering. (want to know more? Click here)

To exploit this I had three ways.

1: NoRedirect (Firefox Add-on)

2: Turning off JavaScript of browser.

3: HTTP response tampering via Burp suite.


Image for post
Image for post
Asus’s Admin panel Login page



As you can see index.php is the login page. So here I brute forced the current directory with Dirbuster and got dashboard.php is present there but directly we can’t access it so here I turned off JavaScript and browsed it again and got access to the panel and tried with no redirect add-on and it was working too. Then I tried HTTP response tampering via Burp Suite and got success. Below is video POC.

Reported Asus’s Security team on

Nov 22, 2018 at 10:12 PM — But they didn’t respond me.

Dec 4, 2018 at 8:38 PM — I had Resend the report to them and they answered this time on.

Dec 5, 2018 at 8:21 AM and fixed it.

I must say they are too slow to answer to your reports.

Check out my SSRF write up Here.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch

Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore

Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store