vendor:
Wireless N150 Router
by:
Nathu Nandwani
8.8
CVSS
HIGH
Cross-Site Request Forgery
352
CWE
Product Name: Wireless N150 Router
Affected Version From: 5.07.50
Affected Version To: 5.07.50
Patch Exists: YES
Related CWE: CVE-2015-5996
CPE: h:tenda:wireless_n150_router
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2018
Tenda Wireless N150 Router 5.07.50 – Cross-Site Request Forgery (Reboot Router)
The router is vulnerable to a cross-site request forgery attacker. If an administrator is currently logged in and visits a remote webpage containing forms existing in the router's firmware, a request can be forged to modify existing settings or even set the router to its default state. These are two examples that can work in the proof of concept: /goform/SysToolReboot - Reboot the router /goform/SysToolRestoreSet - Set the router to default settings
Mitigation:
Administrators should ensure that they are not logged in to the router when visiting untrusted websites. Additionally, they should ensure that the router is running the latest version of its firmware.