ASUS’S ADMIN PANEL AUTH BYPASS
So this is the write up for my Asus’s admin panel bypass report that most of my friends were asking me. If you have private programs to test feel free to contact me on https://twitter.com/by6153
The vulnerability was within their (.in) domain (asus.in) it was a PHP based admin panel and the vulnerability were:
1: forced browsing. (Want to know more? click here)
2: HTTP response tampering. (want to know more? Click here)
To exploit this I had three ways.
1: NoRedirect (Firefox Add-on)
3: HTTP response tampering via Burp suite.
Reported Asus’s Security team on
Nov 22, 2018 at 10:12 PM — But they didn’t respond me.
Dec 4, 2018 at 8:38 PM — I had Resend the report to them and they answered this time on.
Dec 5, 2018 at 8:21 AM and fixed it.
I must say they are too slow to answer to your reports.
Check out my SSRF write up Here.