Multiple cross-site request forgery (CSRF) vulnerabilities in TRENDnet TEW-812DRU router with firmware before 1.0.9.0 allow remote attackers to hijack the authentication of administrators for requests that (1) change admin credentials in a request to setSysAdm.cgi, (2) enable remote management or (3) enable port forwarding in an Apply action to uapply.cgi, or (4) have unspecified impact via a request to setNTP.cgi. NOTE: some of these details are obtained from third party information.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://osvdb.org/95803 | vdb entry |
http://securityevaluators.com/content/case-studies/routers/Vulnerability_Catalog.pdf | exploit |
http://securityevaluators.com/knowledge/case_studies/routers/trendnet_tew-812dru.php | exploit |
http://secunia.com/advisories/54310 | third party advisory vendor advisory |
http://infosec42.blogspot.com/2013/07/exploit-trendnet-tew-812dru-csrfcommand.html | exploit |