Hijacked Session - CVE-2020–9370

Rafael Silva
2 min readFeb 26, 2020

--

A vulnerability in the session management functionality of the web-based interface for HGA12R-02 Router could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. An attacker could use this impersonated session to create a new user account or otherwise control the device with the privileges of the hijacked session.

Proof Of Concept

First Step —

Start data capture by Wireshark by collecting network packets to gain access to the session ID.

Second Step —

Identify the session ID capture.

Third Step —

Replace the session ID and gain access to the router.

You will have access to the router, after refreshing the page.

Video —

https://vimeo.com/394019476

--

--