An insecure direct object reference vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows the ability to reference the "download_sys_settings" action and then specify files arbitrarily throughout the system via the act parameter.
The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.
Link | Tags |
---|---|
https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-exploitation | third party advisory exploit |
https://github.com/mefulton/asustorexploit | third party advisory exploit |
http://seclists.org/fulldisclosure/2018/May/2 | mailing list exploit third party advisory |