Cross-site request forgery (CSRF) vulnerability in the device management interface in Buffalo AirStation WHR-G54S 1.20 allows remote attackers to make configuration changes as an administrator via HTTP requests to certain HTML pages in the res parameter with an inp req parameter to cgi-bin/cgi, as demonstrated by accessing (1) ap.html and (2) filter_ip.html.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.louhi.fi/advisory/buffalo_070907.txt | exploit |
http://www.securityfocus.com/archive/1/478801/100/0/threaded | mailing list |
http://osvdb.org/37665 | vdb entry |
http://www.securityfocus.com/archive/1/478795/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36492 | vdb entry |
http://secunia.com/advisories/26712 | third party advisory |
http://www.securityfocus.com/bid/25588 | vdb entry exploit |
http://securityreason.com/securityalert/3117 | third party advisory |