Multiple cross-site request forgery (CSRF) vulnerabilities in apply.cgi in DD-WRT 24 sp2 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the ping_ip parameter; (2) change the administrative credentials via the http_username and http_passwd parameters; (3) enable remote administration via the remote_management parameter; or (4) configure port forwarding via certain from, to, ip, and pro parameters. NOTE: This issue reportedly exists because of a "weak ... anti-CSRF fix" implemented in 24 sp2.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/9209 | exploit |
http://www.securityfocus.com/archive/1/499119 | mailing list |
http://www.dd-wrt.com/phpBB2/viewtopic.php?t=55173 | exploit |
http://www.securityfocus.com/archive/1/499135 | exploit mailing list |
http://www.securityfocus.com/archive/1/499024 | exploit mailing list |