Vulnerability CVE-2013-3098


Published: 2014-02-04   Modified: 2014-02-05

Description:
Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information.

See advisories in our WLB2 database:
Topic
Author
Date
High
TRENDnet TEW-812DRU CSRF Command Injection > Shell Exploit
Jacob Holcomb
29.07.2013

Type:

CWE-352

(Cross-Site Request Forgery (CSRF))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Trendnet -> Tew-812dru 
Trendnet -> Tew-812dru firmware 

 References:
http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php
http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf
http://secunia.com/advisories/54310
http://osvdb.org/95803
http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html

Copyright 2024, cxsecurity.com

 

Back to Top