Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DSL-2740B Gateway with firmware EU_1.00 allow remote attackers to hijack the authentication of administrators for requests that (1) enable or disable Wireless MAC Address Filters via a wlFltMode action to wlmacflt.cmd, (2) enable or disable firewall protections via a request to scdmz.cmd, or (3) enable or disable remote management via a save action to scsrvcntr.cmd.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/123200/D-Link-DSL-2740B-Cross-Site-Request-Forgery.html - Exploit | |
References | () http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10004 - Vendor Advisory | |
References | () http://www.webapp-security.com/2013/09/d-link-dsl-2740b-multiple-csrf-vulnerabilities - | |
References | () http://www.webapp-security.com/wp-content/uploads/2013/09/D-Link-DSL-2740B-Multiple-CSRF-Vulnerabilities1.txt - Exploit |
Information
Published : 2013-11-20 13:19
Updated : 2024-11-21 01:58
NVD link : CVE-2013-5730
Mitre link : CVE-2013-5730
CVE.ORG link : CVE-2013-5730
JSON object : View
Products Affected
dlink
- dsl-2740b
- dsl-2740b_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)