Callisto 821+R3 Cross Site Request Forgery

2015.10.06
Credit: MustLive
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

Hello list! After all my advisories about vulnerabilities in Callisto 821+ (http://seclists.org/fulldisclosure/2011/Aug/1) and recent advisory about Callisto 821+R3, here is new one. Because vendor ignored in 2011 all my letters and subsequent my public disclosure of vulnerabilities and new devices are vulnerable as well, so I disclosed vulnerabilities in Callisto 821+R3 ADSL Router. These are Cross-Site Request Forgery vulnerabilities. The whole control panel is vulnerable to CSRF, here are two vulnerabilities. SecurityVulns ID: 11700. ------------------------- Affected products: ------------------------- Vulnerable is the next model: Callisto 821+R3, Firmware Version: ZXDSL 831IIV7.5.1a_E09_UA. This model with other firmware and also other models of Callisto also must be vulnerable. ---------- Details: ---------- Cross-Site Request Forgery (WASC-09): For changing login and password of admin: http://site/adminpasswd.cgi?action=save&sysUserName=admin&sysPassword=E696D64616 For changing login and password of user: http://site/userpasswd.cgi?action=save&usrUserName=user&usrPassword=27563757 Parameters sysPassword and usrPassword contain encrypted password. The cipher is simple - this is hex values of chars in reverse order. I mentioned about these vulnerabilities at my site (http://websecurity.com.ua/7975/). Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua

References:

http://websecurity.com.ua


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top