CVE-2015-2676

Cross-site request forgery (CSRF) vulnerability in the ASUS RT-G32 routers with firmware 2.0.2.6 and 2.0.3.2 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via a request to start_apply.htm.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:asus:rt-g32_firmware:2.0.2.6:*:*:*:*:*:*:*
cpe:2.3:o:asus:rt-g32_firmware:2.0.3.2:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-g32:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:27

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html - Exploit () http://packetstormsecurity.com/files/130724/ASUS-RT-G32-Cross-Site-Request-Forgery-Cross-Site-Scripting.html - Exploit
References () http://seclists.org/fulldisclosure/2015/Mar/42 - Exploit () http://seclists.org/fulldisclosure/2015/Mar/42 - Exploit
References () http://websecurity.com.ua/7644/ - Exploit () http://websecurity.com.ua/7644/ - Exploit
References () http://www.securityfocus.com/bid/73294 - () http://www.securityfocus.com/bid/73294 -

Information

Published : 2015-03-23 16:59

Updated : 2024-11-21 02:27


NVD link : CVE-2015-2676

Mitre link : CVE-2015-2676

CVE.ORG link : CVE-2015-2676


JSON object : View

Products Affected

asus

  • rt-g32_firmware
  • rt-g32
CWE
CWE-352

Cross-Site Request Forgery (CSRF)