Hijacked Session - CVE-2020–9370
A vulnerability in the session management functionality of the web-based interface for HGA12R-02 Router could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. An attacker could use this impersonated session to create a new user account or otherwise control the device with the privileges of the hijacked session.
Proof Of Concept
First Step —
Start data capture by Wireshark by collecting network packets to gain access to the session ID.
Second Step —
Identify the session ID capture.
Third Step —
Replace the session ID and gain access to the router.
You will have access to the router, after refreshing the page.
Video —