*Advisory Information* Title: Multiple vulnerabilities in ZyXel GS1510 web front end Date published: 2012-03-14 12:57:15 AM upSploit Ref: UPS-2011-0042 *Advisory Summary* IT Security Geeks have discovered multiple vulnerabilities in the ZyXel 1510 24-port Ethernet switch, these include Admin password stored in Cookie, reflected Cross-Site Scripting (XSS), and clear-text password submission. *Vendor* Zyxel *Affected Software* V1.00(BVN.1) This is the firmware that runs on the ZyXel model GS1510-24 switch. *Description of Issue* The GS1510-24 ZyXel switch, running firmware V1.00(BVN.1), is susceptible to multiple vulnerabilities, these are all within the management web interface, and are as follows: 1. The management web interface Cookie contains both the username and the password for the Admin user to log into the switch. 2. Cleartext submission of password. The page contains a form with the following action URL, which is submitted over clear-text HTTP: http://192.168.1.5/webctrl.cgi The form contains the following password field: password 3. Cross Site Scripting The payload fe07b