CVE-2023-52235

SpaceX Starlink Wi-Fi router GEN 2 before 2023.53.0 and Starlink Dish before 07dd2798-ff15-4722-a9ee-de28928aed34 allow CSRF (e.g., for a reboot) via a DNS Rebinding attack.
Configurations

No configuration.

History

21 Nov 2024, 08:39

Type Values Removed Values Added
References () https://bugcrowd.com/disclosures/f529009b-90eb-4bf9-957d-6fe7ea890fa2/starlink-dishy-is-vulnerable-to-csrf-via-dns-rebinding - () https://bugcrowd.com/disclosures/f529009b-90eb-4bf9-957d-6fe7ea890fa2/starlink-dishy-is-vulnerable-to-csrf-via-dns-rebinding -

01 Aug 2024, 13:45

Type Values Removed Values Added
Summary
  • (es) El router Wi-Fi SpaceX Starlink GEN 2 anterior a 2023.53.0 y Starlink Dish anterior a 07dd2798-ff15-4722-a9ee-de28928aed34 permiten CSRF (por ejemplo, para un reinicio) a través de un ataque de reenlace de DNS.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-350

05 Apr 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-05 06:15

Updated : 2024-11-21 08:39


NVD link : CVE-2023-52235

Mitre link : CVE-2023-52235

CVE.ORG link : CVE-2023-52235


JSON object : View

Products Affected

No product.

CWE
CWE-350

Reliance on Reverse DNS Resolution for a Security-Critical Action