Multiple cross-site request forgery (CSRF) vulnerabilities on the iSpot 2.0.0.0 R1679, and the ClearSpot 2.0.0.0 R1512 and R1786, with firmware 1.9.9.4 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the cmd parameter in an act_cmd_result action to webmain.cgi, (2) enable remote management via an enable_remote_access act_network_set action to webmain.cgi, (3) enable the TELNET service via an ENABLE_TELNET act_set_wimax_etc_config action to webmain.cgi, (4) enable TELNET sessions via a certain act_network_set action to webmain.cgi, or (5) read arbitrary files via the FILE_PATH parameter in an act_file_download action to upgrademain.cgi.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 01:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/42590 - | |
References | () http://www.exploit-db.com/exploits/15728/ - Exploit | |
References | () https://www.trustwave.com/spiderlabs/advisories/TWSL2010-008.txt - Exploit |
Information
Published : 2010-12-30 19:00
Updated : 2024-11-21 01:21
NVD link : CVE-2010-4507
Mitre link : CVE-2010-4507
CVE.ORG link : CVE-2010-4507
JSON object : View
Products Affected
clear
- clearspot_firmware
- ispot
- ispot_firmware
- clearspot
CWE
CWE-352
Cross-Site Request Forgery (CSRF)