vendor:
RWR-3G-100 Router
by:
Touhid M.Shaikh
8,8
CVSS
HIGH
Cross-Site Request Forgery
352
CWE
Product Name: RWR-3G-100 Router
Affected Version From: Ver1.0.56
Affected Version To: Ver1.0.56
Patch Exists: NO
Related CWE: N/A
CPE: h:realtime:rwr-3g-100_router
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2017
RealTime RWR-3G-100 Router Cross-Site Request Forgery (Change Admin Password)
This exploit allows an attacker to change the admin password of RealTime RWR-3G-100 Router by sending a malicious request to the router. The malicious request is sent using a form with the username and password fields. The form is submitted to the router's IP address with the action set to 'goform/formPasswordSetup'. The attacker can then set the new password to whatever they want.
Mitigation:
The router should be configured to only accept requests from trusted sources. Additionally, the router should be configured to use strong passwords and two-factor authentication.