vendor:
DC38 3-in-1 N300 Mini Wireless Range Extend
by:
Raffaele Sabato
8.8
CVSS
HIGH
Cross-site Request Forgery (CSRF)
352
CWE
Product Name: DC38 3-in-1 N300 Mini Wireless Range Extend
Affected Version From: RTN2-AW.GD.R3465.1.20161103
Affected Version To: RTN2-AW.GD.R3465.1.20161103
Patch Exists: YES
Related CWE: CVE-2018-5720
CPE: h:dodocool:dc38_3-in-1_n300_mini_wireless_range_extend
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2018
DODOCOOL DC38 N300 Cross-site Request Forgery
An issue was discovered in DODOCOOL DC38 3-in-1 N300 Mini Wireless Range Extend RTN2-AW.GD.R3465.1.20161103 devices. A Cross-site request forgery (CSRF) vulnerability allows remote attackers to hijack the authentication of users for requests that modify the configuration. This vulnerability may lead to username and/or password changing, Wi-Fi password changing, etc.
Mitigation:
The best way to mitigate CSRF attacks is to use a combination of both server-side and client-side security measures. Server-side measures include using a unique token for each request, validating the origin of the request, and using a secure connection. Client-side measures include using a secure connection, validating the origin of the request, and using a unique token for each request.