vendor:
Devolo dLAN 550 duo+ Starter Kit
by:
Stefan Petrushevski aka sm
N/A
CVSS
N/A
Cross-Site Request Forgery
352
CWE
Product Name: Devolo dLAN 550 duo+ Starter Kit
Affected Version From: dLAN 500 AV Wireless+ 3.1.0-1 (i386)
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE:
CPE:
Platforms Tested: Linux
2017
devolo dLAN 550 duo+ Starter Kit Cross-Site Request Forgery
The web application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. The devolo web application uses predictable URL/form actions in a repeatable way. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
Mitigation:
Implement proper validation and verification of HTTP requests to prevent Cross-Site Request Forgery attacks.