Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with an ACK or NAK message. Studying the NAK case revealed that the router erroneously sends the NAK to both Host and Guest networks with the same Transaction ID as found in the DHCP Request. This allows encoding of data to be sent cross-router into the 32-bit Transaction ID field.
References
Link | Resource |
---|---|
https://orenlab.sise.bgu.ac.il/publications/CrossRouter | Exploit Third Party Advisory |
https://www.usenix.org/system/files/woot19-paper_ovadia.pdf | Third Party Advisory |
https://orenlab.sise.bgu.ac.il/publications/CrossRouter | Exploit Third Party Advisory |
https://www.usenix.org/system/files/woot19-paper_ovadia.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://orenlab.sise.bgu.ac.il/publications/CrossRouter - Exploit, Third Party Advisory | |
References | () https://www.usenix.org/system/files/woot19-paper_ovadia.pdf - Third Party Advisory |
Information
Published : 2019-08-27 18:15
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13269
Mitre link : CVE-2019-13269
CVE.ORG link : CVE-2019-13269
JSON object : View
Products Affected
edimax
- br-6208ac_v1
- br-6208ac_v1_firmware
CWE
CWE-20
Improper Input Validation