Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp2 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters. NOTE: This issue reportedly exists because of a "weak ... anti-CSRF fix" implemented in 24 sp2.
References
Configurations
History
21 Nov 2024, 00:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173 - Exploit | |
References | () http://www.securityfocus.com/archive/1/499024 - Exploit | |
References | () http://www.securityfocus.com/archive/1/499119 - | |
References | () http://www.securityfocus.com/archive/1/499135 - Exploit | |
References | () https://www.exploit-db.com/exploits/9209 - |
Information
Published : 2009-08-14 15:16
Updated : 2024-11-21 00:57
NVD link : CVE-2008-6975
Mitre link : CVE-2008-6975
CVE.ORG link : CVE-2008-6975
JSON object : View
Products Affected
dd-wrt
- dd-wrt
CWE
CWE-352
Cross-Site Request Forgery (CSRF)