NETGEAR WNR3500U and WNR3500L routers uses form tokens abased solely on router's current date and time, which allows attackers to guess the CSRF tokens.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.ise.io/casestudies/exploiting-soho-routers/ | third party advisory |
https://www.ise.io/soho_service_hacks/ | third party advisory |
https://www.ise.io/research/studies-and-papers/netgear_wnr3500/ | exploit third party advisory mitigation |