iBall WRB303N devices allow CSRF attacks, as demonstrated by enabling remote management, enabling DHCP, or modifying the subnet range for IP addresses.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://gist.github.com/Saket-taneja/4dda4b2df5aa0973a7160bb6bf8875e0 | third party advisory exploit |
https://github.com/Saket-taneja/IballCSRFExploit | third party advisory |