Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/9209 | exploit |
http://www.securityfocus.com/archive/1/499132 | mailing list |
http://www.securityfocus.com/archive/1/499119 | mailing list |
http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173 | vendor advisory exploit |
http://www.securityfocus.com/archive/1/499135 | mailing list |
http://www.securityfocus.com/archive/1/499024 | mailing list |