VYPR
Medium severity5.3NVD Advisory· Published Feb 5, 2026· Updated Apr 15, 2026

CVE-2020-37144

CVE-2020-37144

Description

Exagate SYSGuard 6001 contains a cross-site request forgery vulnerability that allows attackers to create unauthorized admin accounts through a crafted HTML form. Attackers can trick users into submitting a malicious form to /kulyon.php that adds a new user with administrative privileges without the victim's consent.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2020-37144 is a CSRF in Exagate SYSGuard 6001 allowing attackers to create admin accounts via a crafted form to /kulyon.php.

The vulnerability is a cross-site request forgery (CSRF) in the Exagate SYSGuard 6001 environmental monitoring appliance. The application fails to implement any anti-CSRF tokens or protection mechanisms in its administrative interface, specifically in the user management functionality. The endpoint /kulyon.php accepts POST requests to add new users without verifying the origin of the request, making it susceptible to CSRF attacks [3].

To exploit this, an attacker crafts an HTML form that submits a POST request to the target device at /kulyon.php with parameters for username, password, privilege level (set to 0 for admin), and a button value ("Ekle"). The attacker then lures an authenticated administrator into viewing a page containing this form, which automatically submits via JavaScript or user click. The request is processed as if it came from the legitimate admin, creating a new user account with administrative privileges [3]. No authentication is bypassed; the attack relies on the victim's session.

Successful exploitation allows an attacker to gain unauthorized administrative access to the SYSGuard 6001 device. With admin privileges, the attacker can modify system configurations, access sensitive environmental monitoring data, and potentially pivot to other network resources managed by the appliance. The CSRF attack can be performed remotely if the attacker can induce an admin to visit a malicious page while logged into the device.

Exagate has not released a security advisory or patch for this issue; the product may be end-of-life as the vendor's website no longer lists the SYSGuard 6001 [1]. The exploit was publicly disclosed via Exploit-DB in August 2019 [3]. As no official fix exists, mitigations include deploying a web application firewall, enforcing same-origin policy, and restricting access to the administrative interface to trusted networks only.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.