VAR-200906-0439

Vulnerability from variot - Updated: 2025-04-10 23:00

Cross-site request forgery (CSRF) vulnerability in Linksys WRT160N wireless router hardware 1 and firmware 1.02.2 allows remote attackers to hijack the authentication of other users for unspecified requests via unknown vectors, as demonstrated using administrator privileges and actions. The Linksys WRT160N wireless router is prone to a cross-site request-forgery vulnerability. Successful exploits can run privileged commands on the affected device, including enabling remote access to the web administration interface. This may lead to further network-based attacks. Linksys WRT160N running firmware 1.02.2 is vulnerable. WRT160N is the latest 802.11n wireless router launched by Linksy. ----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia report for 2008.

Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics

Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


TITLE: Linksys WRT160N Cross-Site Request Forgery Vulnerability

SECUNIA ADVISORY ID: SA34625

VERIFY ADVISORY: http://secunia.com/advisories/34625/

DESCRIPTION: Russ McRee has reported a vulnerability in Linksys WRT160N, which can be exploited by malicious people to conduct cross-site request forgery attacks.

The administrative web interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform administrative actions when a logged in administrator is tricked into visiting a malicious web page. Other versions may also be affected.

SOLUTION: Do not browse untrusted web sites while being logged in to the administrative web interface.

PROVIDED AND/OR DISCOVERED BY: Russ McRee, HolisticInfoSec

ORIGINAL ADVISORY: http://holisticinfosec.org/content/view/109/45/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200906-0439",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wrt160n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "1.02.2"
      },
      {
        "model": "linksys wrt160n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "hardware 1 and  firmware 1.02.2"
      },
      {
        "model": "wrt160n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "linksys",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "34448"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2073"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:cisco:wrt160n",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Russ McRee",
    "sources": [
      {
        "db": "BID",
        "id": "34448"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-2073",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-2073",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-39519",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-2073",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-2073",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200906-264",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-39519",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2073"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability in Linksys WRT160N wireless router hardware 1 and firmware 1.02.2 allows remote attackers to hijack the authentication of other users for unspecified requests via unknown vectors, as demonstrated using administrator privileges and actions. The Linksys WRT160N wireless router is prone to a cross-site request-forgery vulnerability. \nSuccessful exploits can run privileged commands on the affected device, including enabling remote access to the web administration interface. This may lead to further network-based attacks. \nLinksys WRT160N running firmware 1.02.2 is vulnerable. WRT160N is the latest 802.11n wireless router launched by Linksy. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nLinksys WRT160N Cross-Site Request Forgery Vulnerability\n\nSECUNIA ADVISORY ID:\nSA34625\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34625/\n\nDESCRIPTION:\nRuss McRee has reported a vulnerability in Linksys WRT160N, which can\nbe exploited by malicious people to conduct cross-site request forgery\nattacks. \n\nThe administrative web interface allows users to perform certain\nactions via HTTP requests without performing any validity checks to\nverify the requests. This can be exploited to perform administrative\nactions when a logged in administrator is tricked into visiting a\nmalicious web page. Other\nversions may also be affected. \n\nSOLUTION:\nDo not browse untrusted web sites while being logged in to the\nadministrative web interface. \n\nPROVIDED AND/OR DISCOVERED BY:\nRuss McRee, HolisticInfoSec\n\nORIGINAL ADVISORY:\nhttp://holisticinfosec.org/content/view/109/45/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-2073"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "db": "BID",
        "id": "34448"
      },
      {
        "db": "VULHUB",
        "id": "VHN-39519"
      },
      {
        "db": "PACKETSTORM",
        "id": "76504"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-2073",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "34448",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "34625",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "53414",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-0982",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "49775",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "160",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-39519",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "76504",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39519"
      },
      {
        "db": "BID",
        "id": "34448"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "db": "PACKETSTORM",
        "id": "76504"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2073"
      }
    ]
  },
  "id": "VAR-200906-0439",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39519"
      }
    ],
    "trust": 0.9333333
  },
  "last_update_date": "2025-04-10T23:00:36.885000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2073"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://holisticinfosec.org/content/view/109/45/"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/34448"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/53414"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/34625"
      },
      {
        "trust": 1.7,
        "url": "http://www.vupen.com/english/advisories/2009/0982"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49775"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2073"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2073"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/49775"
      },
      {
        "trust": 0.3,
        "url": "http://www.linksys.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/try_vi/request_2008_report/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34625/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-39519"
      },
      {
        "db": "BID",
        "id": "34448"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "db": "PACKETSTORM",
        "id": "76504"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2073"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-39519"
      },
      {
        "db": "BID",
        "id": "34448"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "db": "PACKETSTORM",
        "id": "76504"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2073"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-06-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39519"
      },
      {
        "date": "2009-04-09T00:00:00",
        "db": "BID",
        "id": "34448"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "date": "2009-04-09T13:21:31",
        "db": "PACKETSTORM",
        "id": "76504"
      },
      {
        "date": "2009-04-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      },
      {
        "date": "2009-06-15T19:30:05.780000",
        "db": "NVD",
        "id": "CVE-2009-2073"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-39519"
      },
      {
        "date": "2015-04-13T21:11:00",
        "db": "BID",
        "id": "34448"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-003505"
      },
      {
        "date": "2009-06-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-2073"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linksys WRT160N Wireless Router Cross-Site Request Forgery Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "34448"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-264"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…