VAR-201005-0438

Vulnerability from variot - Updated: 2022-05-17 02:10

U.S.Robotics USR5463 is a popular router device in foreign countries. The application device does not properly perform any legal verification of the request, allowing the user to perform partial management operations through HTTP requests. If you build malicious parameters passed to the /cgi-bin/setup_ddns.exe script and entice the user to click, you can change the device configuration and more. U.S.Robotics USR5463 firmware is prone to a cross-site request-forgery vulnerability. Successful exploits may allow attackers to perform unauthorized actions on the affected device in the context of a logged-in user. This may allow attackers to gain access to or modify sensitive information and perform HTML-injection attacks. U.S.Robotics USR5463 firmware versions 0.01 through 0.06 are vulnerable. ----------------------------------------------------------------------

Stay Compliant

Alerts, Technical Descriptions, PoC, Links to patches, CVSS, CVE, Changelogs, Alternative Remediation Strategies, and much more provided in the Secunia Vulnerability Intelligence solutions

Free Trial http://secunia.com/products/corporate/evm/trial/


TITLE: USR5463 802.11g Wireless Router Cross-Site Request Forgery

SECUNIA ADVISORY ID: SA39889

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/39889/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=39889

RELEASE DATE: 2010-05-25

DISCUSS ADVISORY: http://secunia.com/advisories/39889/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/39889/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=39889

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: David K. has reported a vulnerability in the USR5463 802.11g Wireless Router, which can be exploited by malicious people to conduct cross-site request forgery attacks. This can be exploited to e.g. conduct script insertion attacks via specially crafted parameters passed to the /cgi-bin/setup_ddns.exe script.

SOLUTION: Do not browse untrusted websites or follow untrusted links while logged-in to the device.

PROVIDED AND/OR DISCOVERED BY: David K.

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "no",
        "version": null
      },
      {
        "_id": null,
        "model": "usr5463",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "u s robotics",
        "version": "0.06"
      },
      {
        "_id": null,
        "model": "usr5463",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "u s robotics",
        "version": "0.05"
      },
      {
        "_id": null,
        "model": "usr5463",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "u s robotics",
        "version": "0.04"
      },
      {
        "_id": null,
        "model": "usr5463",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "u s robotics",
        "version": "0.03"
      },
      {
        "_id": null,
        "model": "usr5463",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "u s robotics",
        "version": "0.02"
      },
      {
        "_id": null,
        "model": "usr5463",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "u s robotics",
        "version": "0.01"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957"
      },
      {
        "db": "BID",
        "id": "40348"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "David K.",
    "sources": [
      {
        "db": "BID",
        "id": "40348"
      }
    ],
    "trust": 0.3
  },
  "description": {
    "_id": null,
    "data": "U.S.Robotics USR5463 is a popular router device in foreign countries. The application device does not properly perform any legal verification of the request, allowing the user to perform partial management operations through HTTP requests. If you build malicious parameters passed to the /cgi-bin/setup_ddns.exe script and entice the user to click, you can change the device configuration and more. U.S.Robotics USR5463 firmware is prone to a cross-site request-forgery vulnerability. \nSuccessful exploits may allow attackers to perform unauthorized actions on the affected device in the context of a logged-in user. This may allow attackers to gain access to or modify sensitive information and perform HTML-injection attacks. \nU.S.Robotics USR5463 firmware versions 0.01 through 0.06 are vulnerable. ----------------------------------------------------------------------\n\n\nStay Compliant\n\nAlerts, Technical Descriptions, PoC, Links to patches, CVSS, CVE, Changelogs, Alternative Remediation Strategies, and much more provided in the Secunia Vulnerability Intelligence solutions\n\nFree Trial\nhttp://secunia.com/products/corporate/evm/trial/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nUSR5463 802.11g Wireless Router Cross-Site Request Forgery\n\nSECUNIA ADVISORY ID:\nSA39889\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/39889/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=39889\n\nRELEASE DATE:\n2010-05-25\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/39889/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/39889/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=39889\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nDavid K. has reported a vulnerability in the USR5463 802.11g Wireless\nRouter, which can be exploited by malicious people to conduct\ncross-site request forgery attacks. This can be exploited to e.g. conduct script insertion\nattacks via specially crafted parameters passed to the\n/cgi-bin/setup_ddns.exe script. \n\nSOLUTION:\nDo not browse untrusted websites or follow untrusted links while\nlogged-in to the device. \n\nPROVIDED AND/OR DISCOVERED BY:\nDavid K. \n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957"
      },
      {
        "db": "BID",
        "id": "40348"
      },
      {
        "db": "PACKETSTORM",
        "id": "89926"
      }
    ],
    "trust": 0.9
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "BID",
        "id": "40348",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "39889",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "89926",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957"
      },
      {
        "db": "BID",
        "id": "40348"
      },
      {
        "db": "PACKETSTORM",
        "id": "89926"
      }
    ]
  },
  "id": "VAR-201005-0438",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957"
      }
    ],
    "trust": 1.2666667
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957"
      }
    ]
  },
  "last_update_date": "2022-05-17T02:10:51.449000Z",
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 0.7,
        "url": "http://secunia.com/advisories/39889/"
      },
      {
        "trust": 0.3,
        "url": "http://www.usr-emea.com/support/s-prod-template.asp?loc=emea\u0026prod=5463"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=39889"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/39889/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/trial/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957"
      },
      {
        "db": "BID",
        "id": "40348"
      },
      {
        "db": "PACKETSTORM",
        "id": "89926"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957",
        "ident": null
      },
      {
        "db": "BID",
        "id": "40348",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "89926",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2010-05-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-0957",
        "ident": null
      },
      {
        "date": "2010-05-25T00:00:00",
        "db": "BID",
        "id": "40348",
        "ident": null
      },
      {
        "date": "2010-05-25T14:19:55",
        "db": "PACKETSTORM",
        "id": "89926",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2010-05-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-0957",
        "ident": null
      },
      {
        "date": "2010-05-25T18:32:00",
        "db": "BID",
        "id": "40348",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "40348"
      }
    ],
    "trust": 0.3
  },
  "title": {
    "_id": null,
    "data": "U.S.Robotics USR5463 firmware \u0027/cgi-bin/setup_ddns.exe\u0027 cross-site request forgery vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-0957"
      },
      {
        "db": "BID",
        "id": "40348"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "_id": null,
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "40348"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…