Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html - Exploit | |
References | () http://osvdb.org/95803 - | |
References | () http://secunia.com/advisories/54310 - Vendor Advisory | |
References | () http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf - Exploit | |
References | () http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php - Exploit |
Information
Published : 2014-02-04 21:55
Updated : 2024-11-21 01:53
NVD link : CVE-2013-3098
Mitre link : CVE-2013-3098
CVE.ORG link : CVE-2013-3098
JSON object : View
Products Affected
trendnet
- tew-812dru
- tew-812dru_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)