vendor:
DPC2420
by:
Facundo M. de la Cruz (tty0)
8,8
CVSS
HIGH
Configuration file disclosure and Persistent XSS
79 (Cross-site Scripting)
CWE
Product Name: DPC2420
Affected Version From: D2425-P10-13-v202r12811-110511as-TRO.bin
Affected Version To: D2425-P10-13-v202r12811-110511as-TRO
Patch Exists: NO
Related CWE: N/A
CPE: h:cisco:dpc2420
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2012
DPC2420 Multiple vulnerabilities
Some ISP's (like the Argentinean Telecentro) could make some changes in the router configration via the TCP 8080 port. If the remote config option is enabled and the port is not filter, an attacker can download this file calling the correct URL. With a valid user in the router web interface for managment and configuration, a user could insert a XSS payload in the 'User Password' field. This payload will be stored in the configuration file and will be executed when the router is restarted.
Mitigation:
Disable remote configuration, filter TCP port 8080, and use strong passwords.