vendor:
HG520 ADSL2+ Wireless Modem
by:
Dhruv Shah
8,8
CVSS
HIGH
Cross Site Request Forgery
352
CWE
Product Name: HG520 ADSL2+ Wireless Modem
Affected Version From: Firmware Version:2.11.38.0(RE0.C2B)3.9.9.5
Affected Version To: Firmware Version:2.11.38.0(RE0.C2B)3.9.9.5
Patch Exists: NO
Related CWE: N/A
CPE: h:trendchip:hg520_adsl2_plus_wireless_modem
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Embedded Allegro RomPager webserver 4.07 UPnP/1.0 (ZyXEL ZyWALL 2)
2014
Trendchip HG520 ADSL2+ Wireless Modem CSRF Vulnerability
This Modem's Web Application , suffers from Cross-site request forgery through which attacker can manipulate user data via sending him malicious craft url. The Modems's Application not using any security token to prevent it against CSRF. You can manipulate any userdata. PoC and Exploit to change user password: In the POC the IP address in the POST is the modems IP address.
Mitigation:
Implementing security tokens to prevent CSRF attacks.