Multiple cross-site request forgery (CSRF) vulnerabilities on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and earlier firmware allow remote attackers to perform actions as administrators via an arbitrary valid request to an administrative URI, as demonstrated by (1) a Restore Factory Defaults action using the mtenRestore parameter to setup.cgi and (2) creation of a user account using the sysname parameter to setup.cgi.
References
Configurations
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/43537 - | |
References | () http://osvdb.org/43538 - | |
References | () http://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/ - Exploit | |
References | () http://www.gnucitizen.org/projects/router-hacking-challenge/ - Exploit | |
References | () http://www.securityfocus.com/archive/1/489009/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41269 - |
Information
Published : 2008-03-13 18:44
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6708
Mitre link : CVE-2007-6708
CVE.ORG link : CVE-2007-6708
JSON object : View
Products Affected
linksys
- wag54gs
CWE
CWE-352
Cross-Site Request Forgery (CSRF)