vendor:
IPn4G
by:
Security Affairs
9.8
CVSS
CRITICAL
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: IPn4G
Affected Version From: IPn4G 1.1.0 build 1098
Affected Version To: Dragon-LTE 1.1.0 build 1036
Patch Exists: YES
Related CWE: CVE-2020-14072
CPE: cpe:h:microhard_systems:ipn4g
Metasploit:
N/A
Platforms Tested: Windows, Linux, Mac
2020
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway CSRF Vulnerabilities
Microhard Systems Inc. IPn4G, IPn3Gb, Bullet-3G, VIP4Gb, VIP4G, VIP4G-WiFi-N, IPn3Gii, IPn4Gii, BulletPlus, and Dragon-LTE devices are vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can exploit this vulnerability by sending a malicious request to the target device. This can allow an attacker to perform administrative actions on the device, such as changing the device's configuration, or even disabling the device.
Mitigation:
Users should ensure that their devices are running the latest version of the firmware. Additionally, users should ensure that their devices are not exposed to the public internet.