CRLF injection vulnerability in goform/formWlSiteSurvey on the Conceptronic C54APM access point with runtime code 1.26 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the submit-url parameter in a Refresh action.
References
Link | Resource |
---|---|
http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf | Exploit Vendor Advisory |
http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf - Exploit, Vendor Advisory |
Information
Published : 2014-01-10 16:47
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1406
Mitre link : CVE-2014-1406
CVE.ORG link : CVE-2014-1406
JSON object : View
Products Affected
conceptronic
- c54apm_firmware
- c54apm
CWE
CWE-20
Improper Input Validation